<?xml version="1.0" encoding="UTF-8"?>
<manifest schema_version="2.0.0.0">
<otherdata xmlns="http://linux.duke.edu/metadata/other" packages="367">
  <package pkgid="8398fc790f29c887a20202e70137412ec587a37074f0dffe9873f439f5c0c53d" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="14.2.589.4" rel="1.rhel8"/>
    <changelog author="Broadcom Automated Build User" date="1646222400">- Added support for RHEL 8U6</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658750400">- Changed version to 14.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1664193600">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1664280000">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152000">- Changed version to 14.3
- Updated libdfc library
- Updated libemsdm library
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152001">- Added support for ALP 1 SP0</changelog>
  </package>
  <package pkgid="9f7356c2869985aa75776366171fe7d3550195330c4e42ac817fbd18ec932e93" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="14.2.589.4" rel="1.sles12sp5"/>
    <changelog author="Broadcom Automated Build User" date="1646222400">- Added support for RHEL 8U6</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658750400">- Changed version to 14.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1664193600">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1664280000">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152000">- Changed version to 14.3
- Updated libdfc library
- Updated libemsdm library
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152001">- Added support for ALP 1 SP0</changelog>
  </package>
  <package pkgid="a39a047cad05caf2e537bebb3d0e083c88f110d6c4da70de321f5b9ce1a284fe" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="14.2.589.4" rel="1.sles15sp4"/>
    <changelog author="Broadcom Automated Build User" date="1646222400">- Added support for RHEL 8U6</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658750400">- Changed version to 14.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1664193600">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1664280000">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152000">- Changed version to 14.3
- Updated libdfc library
- Updated libemsdm library
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152001">- Added support for ALP 1 SP0</changelog>
  </package>
  <package pkgid="543426136c12a6df84dd051a7da62cffc75557107f67e2fc0a2e6e98c2ca8fa7" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="14.2.589.4" rel="1.sles15sp5"/>
    <changelog author="Broadcom Automated Build User" date="1646222400">- Added support for RHEL 8U6</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658750400">- Changed version to 14.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1664193600">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1664280000">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152000">- Changed version to 14.3
- Updated libdfc library
- Updated libemsdm library
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152001">- Added support for ALP 1 SP0</changelog>
  </package>
  <package pkgid="16750475b921ffdc596e18e0351408cd8f105bb4a764ad6e3590005b44a346bb" name="HPE-CNA-FC-hpeqlgc-Enablement-Kit" arch="noarch">
    <version epoch="0" ver="6.0.0.0" rel="19"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1559908800">Enablement Kit Version: 6.0.0.0-10
----------------------------------

v6.04 build48:
-------------
Defect/Enhancement: Defect
Problem: NVME targets not seen when NVME Id and Subsys Id are different
Solution: Identify NVME targets using subsys Id
Introduced: v6.04 build42
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1565006400">Enablement Kit Version: 6.0.0.0-11
----------------------------------

v6.04 build49:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow SDGetActiveRegions API for 27xx based adapters
Introduced: v6.04 build45
Impact: HW: ISP2071, ISP2271, ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1572868800">Enablement Kit Version: 6.0.0.0-12
----------------------------------

v6.04 build52:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow SCM stats for NVMe targets for Marvell/QLogic Apps
Introduced: v6.04 build52
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Enhancement
Problem: Modalias removal request from HPE
Solution: Remove modalias support from Enablement kit rpm
Introduced: Day One
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build51:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Add additional SCM stats for FCP targets for Marvell/QLogic Apps
Introduced: v6.04 build51
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Defect
Problem: Corruption seen after flash update with some inbox drivers
	 when BSG device creation fails
Solution: Use /dev/bsg path to create BSG device creation
Introduced: v6.00 build9
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build50:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow SCM stats for FCP targets for Marvell/QLogic Apps
Introduced: v6.04 build50
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1587729600">Enablement Kit Version: 6.0.0.0-13
----------------------------------

v6.04 build55:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added MPI Firmware Dump support
Introduced: v6.04 build55
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build54:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Secure remote port info support
Introduced: v6.04 build54
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build53:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Check driver for SCM stats support before reading SCM stats
Introduced: v6.04 build53
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1592481600">Enablement Kit Version: 6.0.0.0-14
----------------------------------

v6.04 build56:
-------------

Defect/Enhancement: Defect
Problem: LUN QoS API returns "Not Supported"
Solution: Fixed QoS value read issue in BSG path
Introduced: v6.04 build21
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61, ISP2031
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1593086400">Enablement Kit Version: 6.0.0.0-15
----------------------------------

v6.04 build57:
-------------

Defect/Enhancement: Defect
Problem: Delay seen in Application bringup on some inbox drivers
Solution: Do not perform retries for newer features if driver returns
	  not supported error
Introduced: v6.04 build28
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1599825600">Enablement Kit Version: 6.0.0.0-16
----------------------------------

v6.04 build63:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow NVMe specific APIs for newer ISPs
Introduced: v6.04 build63
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build62:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added ISP FW and MPI FW lockdown bits
Introduced: v6.04 build62
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build61:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Provide lockdown mode error codes to apps
Introduced: v6.04 build61
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build60:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added adapter firmware lockdown support
Introduced: v6.04 build60
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build59:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added EP2989 support
Introduced: v6.04 build59
Impact: HW: EP2989
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build58:
-------------
Defect/Enhancement: Defect
Problem: HBA Parameters read fails for newer adapters for inbox drivers
Solution: Read active HBA Parameters region set from flash
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1627905600">Enablement Kit Version: 6.0.0.0-17
----------------------------------

v6.04 build75:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Mailbox passthru support
Introduced: v6.04 build75
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build74:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added NVRAM parameters for SCMR Profile support
Introduced: v6.04 build74
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build73:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added SCMR Profile support
Introduced: v6.04 build73
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build72:
-------------
Defect/Enhancement: Defect
Problem: Random apps crash seen when large number of vports present
Solution: Validate vport memory pointers before accessing it
Introduced: v6.04 build24
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build71:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added EP2881 and EP2981 support
Introduced: v6.04 build71
Impact: HW: EP2881, EP2981
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build70:
-------------
Defect/Enhancement: Defect
Problem: Flash update failure on UOS on ARM (aarch64)
Solution: Corrected BSG pointers for UOS on ARM
Introduced: v6.04 build24
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build69:
-------------
Defect/Enhancement: Defect
Problem: Invalid LUN size display for small sized (In MBs) and large sized
	 (in TBs) NVMe LUNs
Solution: Use correct read capacity format to get LUN size of NVMe LUNs
Introduced: v6.04 build52
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build68:
-------------
Defect/Enhancement: Defect
Problem: Apps delay seen with NVMe targets
Solution: Cache common NVMe target data to avoid multiple calls to NVMe targets
Introduced: v6.04 build52
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build67:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Session shutdown state macro support
Introduced: v6.04 build67
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build66:
-------------
Defect/Enhancement: Defect
Problem: Apps crash seen with HBA_RemoveCallback SNIA API
Solution: Avoid double free of memory freed in HBA_RemoveCallback SNIA API
Introduced: Day One
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build65:
-------------
Defect/Enhancement: Defect
Problem: Apps delay seen with disabled/isolated port
Solution: Avoid apps retries for disabled/isolated port
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build64:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added USCM Phase 2 support
Introduced: v6.04 build64
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Defect
Problem: Apps crash seen with disabled/isolated port
Solution: Fixed apps crash with disabled/isolated port
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1644580800">Enablement Kit Version: 6.0.0.0-18
----------------------------------

v6.04 build81:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added NVRAM parameters for UEFI boot support
Introduced: v6.04 build81
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build80:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added additional USCM statistics info
Introduced: v6.04 build80
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build79:
-------------
Defect/Enhancement: Defect
Problem: Port reset seen on all ports of the adapter after HBA parameter update
Solution: Allowed reset only in HBA parameter modified port
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build78:
-------------
Defect/Enhancement: Defect
Problem: Apps crash seen with DPort test with newer firmware
Solution: Increase response buffer size to read extra data provided by FW
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build77:
-------------
Defect/Enhancement: Defect
Problem: NPIV port seen as physical port on newer OSes
Solution: Corrected host number list
Introduced: v6.04 build24
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build76:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added FC-GS-8 based speed definitions
Introduced: v6.04 build76
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1673611200">Enablement Kit Version: 6.0.0.0-19
----------------------------------

v6.05 build7:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Use 32bit buffer size of SFP FW update
Introduced: v6.05 build7
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build6:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added 64G FC SFP FW update support
Introduced: v6.05 build6
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build5:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Remote Port API support
Introduced: v6.05 build5
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build4:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Secure Port V2 API support
Introduced: v6.05 build4
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build3:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Klocwork static analysis fixes
Introduced: v6.05 build3
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build2:
-------------
Defect/Enhancement: Defect
Problem: Feature API confilct seen FOAPI
Solution: Removed conflicting duplicate feature APIs
Introduced: v6.05 build1
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build1:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Klocwork static analysis fixes
Introduced: v6.05 build1
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build90:
-------------
Defect/Enhancement: Defect
Problem: Incorrect NVMe portID seen when multiple targets present
Solution: Provide valid PortIDs for NVMe targets
Introduced: v6.04 build85
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build89:
-------------
Defect/Enhancement: Defect
Problem: Incorrect secure target fields seen
Solution: Provide valid info for secure targets
Introduced: v6.04 build54
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build88:
-------------
Defect/Enhancement: Defect
Problem: NVRAM dat file update failure on 8G adapter
Solution: Fixed dat file update on 8G adapter
Introduced: v6.04 build2
Impact: HW: ISP2532
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build87:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Uncorrectable FEC error count support in USCM stats 
Introduced: v6.04 build87
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build86:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added I/O Throttling support
Introduced: v6.04 build86
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build85:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added PortID support for NVMe targets
Introduced: v6.04 build85
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build84:
-------------
Defect/Enhancement: Defect
Problem: Boot code valid bit is set for all boot codes
Solution: Set boot code valid bit only when valid boot code is found
Introduced: v6.04 build1
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build83:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Virtual Lane support
Introduced: v6.04 build83
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build82:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added new NVRAM parameters
Introduced: v6.04 build82
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
  </package>
  <package pkgid="ce3201b0247b1fdc56458d4d543b7f17bf344598e4d4cdf9359c8cb45acd8c2d" name="MRStorageAdministrator" arch="x86_64">
    <version epoch="0" ver="008.004.016.000" rel="00"/>
  </package>
  <package pkgid="1c0a3dc738edb4259852101e03a9f7d32ec1804ae63d25267f22c15a242799d4" name="amsd" arch="x86_64">
    <version epoch="0" ver="2.7.0" rel="1724.3.rhel7"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.7.0-1724.3.rhel7" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="ee187e75d98d42cadb5886a248a849aeb32584239f3f1482b8dd67f81a97e767" name="amsd" arch="x86_64">
    <version epoch="0" ver="3.3.0" rel="1773.23.rhel8"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.3.0-1773.23.rhel8" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="8977f12c198b33de35640b5fc32890c78f1942f47d6500b31105af52dc28a3f3" name="amsd" arch="x86_64">
    <version epoch="0" ver="3.3.0" rel="1773.7.rhel9"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.3.0-1773.7.rhel9" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="b12906344b4643aea1a23e487e4cbabdf6bf2d850505f82d71862959dbc025fb" name="amsd" arch="x86_64">
    <version epoch="0" ver="3.3.0" rel="1773.7.sles12"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.3.0-1773.7.sles12" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="466c777daa33390cd98f4325d21393bb53f361fba49939a64f06a5d01c49ab8c" name="amsd" arch="x86_64">
    <version epoch="0" ver="3.3.0" rel="1773.7.sles15"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.3.0-1773.7.sles15" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="646bebe75d0b7eaa9d42f6deb63240e016a45842dd9a87a704ff32c14bbc0389" name="be2iscsi-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="ffcb75bfdd7f055d95f00d583d6cda32cafad1b46e501fcb3f3413459824a857" name="be2iscsi-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="e22d19f96bee8ed44eb557c9a9764bcdc1cf5046bdb835b16895d8ee0ae20a72" name="be2net-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="804f3195195fb52876d7716e2c96b782295e44012f1b6d0f6e12fa8e2e3d44ab" name="be2net-kmp-default" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0_k4.12.14_94.41" rel="1.sles12sp4"/>
    <changelog author="Emulex Corporation &lt;tech.support@emulex.com&gt; 10.6.35.0" date="1424174400">-</changelog>
  </package>
  <package pkgid="72620579975e6ed0d2df7e8c403780216a922df36cd6a6ed1effe8c1c6c9b2af" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.2_k4.12.14_120" rel="226.0.141.0.sles12sp5"/>
  </package>
  <package pkgid="c53723a52a0728c3d20ce7e7b45e837c1d3116591aba03e69e04c9046964c7f9" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.2_k5.14.21_150400.22" rel="226.0.141.0.sles15sp4"/>
  </package>
  <package pkgid="b1700fef591a74a580dd986e16dc9084941961f4049d3873f7a1f5fd39b68973" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.2_k5.3.18_57" rel="226.0.141.0.sles15sp3"/>
  </package>
  <package pkgid="bb76b2b06e3b74421bc10d15b8cec0fae50f43a5f9f8f864e7e5795d23c0db06" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="14.2.589.5_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Broadcom Automated Build User&#13;" date="1630324800">- Changed version to 14.0&#13;
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1634126400">- Added support for RHEL 8U5&#13;
- Removed support for RHEL 7U5&#13;
- Removed support for RHEL 7U6&#13;
- Removed support for RHEL 7U7&#13;
- Removed support for RHEL 7U8&#13;
- Removed support for RHEL 8U1&#13;
- Removed support for RHEL 8U2&#13;
- Removed support for RHEL 8U3&#13;
- Removed support for SLES 15 SP1&#13;
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1645012800">- Changed version to 14.2&#13;
- Added support for RHEL 8U6&#13;
- Added support for RHEL 9U0&#13;
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1684497600">- Added support for ALP SP0</changelog>
  </package>
  <package pkgid="85d078406dc45250114ac3b164fee9a258c6be01438b5d66fa39bffd719c35fd" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="14.2.589.5_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="Broadcom Automated Build User" date="1630324800">- Changed version to 14.0
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User" date="1634126400">- Added support for RHEL 8U5
- Removed support for RHEL 7U5
- Removed support for RHEL 7U6
- Removed support for RHEL 7U7
- Removed support for RHEL 7U8
- Removed support for RHEL 8U1
- Removed support for RHEL 8U2
- Removed support for RHEL 8U3
- Removed support for SLES 15 SP1
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User" date="1645012800">- Changed version to 14.2
- Added support for RHEL 8U6
- Added support for RHEL 9U0
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1684497600">- Added support for ALP SP0</changelog>
  </package>
  <package pkgid="b55aac03b2fd11a8fb28932c26edb8d9ba49d754101d0a007b5a38848b0ed01b" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="14.2.589.5_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="Broadcom Automated Build User" date="1630324800">- Changed version to 14.0
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User" date="1634126400">- Added support for RHEL 8U5
- Removed support for RHEL 7U5
- Removed support for RHEL 7U6
- Removed support for RHEL 7U7
- Removed support for RHEL 7U8
- Removed support for RHEL 8U1
- Removed support for RHEL 8U2
- Removed support for RHEL 8U3
- Removed support for SLES 15 SP1
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User" date="1645012800">- Changed version to 14.2
- Added support for RHEL 8U6
- Added support for RHEL 9U0
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1684497600">- Added support for ALP SP0</changelog>
  </package>
  <package pkgid="a92869b83c56fa672365cfead33527d264de7ce13cc8007fef3b178c235f4ab0" name="fibreutils" arch="x86_64">
    <version epoch="0" ver="4.2" rel="1_rhel"/>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-3" date="1260446400">- Fixed discovery of HBAs in adapter_info on Integrity servers with multiple PCI
  busses</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-3" date="1298635200">- Initial release with Emulex CNA support</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-4" date="1323345600">- Fix for dependency check error seen when installing with HPSUM</changelog>
    <changelog author="Kumar Rahul&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-5" date="1329220800">- Removed installation check for kernel 2.6 and addded Installation check for Rhel5.3 and SLES10 SP3 onwards</changelog>
    <changelog author="Shreya Roy Chowdhury&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-6" date="1355832000">- Corrected Link state display information for Qlogic Adapters
- Added MSA G3 support in Scsi_info.h</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 3.3-6" date="1557316800">-Perl dependancy fix for RHEL8</changelog>
    <changelog author="Ratna Dey&lt;rathna.dey@hpe.com&gt; and Aravinda Rajanna &lt;aravinda.rajanna@hpe.com&gt; 4.1-1" date="1561550400">-Initial support added for E4 and will get updated subsequently</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1563451200">-Fixed adpater_info code to display correct Vendor name instead of Unknown</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1564056000">-Removed Brocade HBAs support</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.2-1" date="1630584000">-Removed adapter_info_nx code for E4 adapters</changelog>
  </package>
  <package pkgid="56bbc8f611d073f2b04a8a8cbb774717c01e736ec4d899cf16f75368a574e0fe" name="fibreutils" arch="x86_64">
    <version epoch="0" ver="4.2" rel="1_sles"/>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-3" date="1260446400">- Fixed discovery of HBAs in adapter_info on Integrity servers with multiple PCI
  busses</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-3" date="1298635200">- Initial release with Emulex CNA support</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-4" date="1323345600">- Fix for dependency check error seen when installing with HPSUM</changelog>
    <changelog author="Kumar Rahul&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-5" date="1329220800">- Removed installation check for kernel 2.6 and addded Installation check for Rhel5.3 and SLES10 SP3 onwards</changelog>
    <changelog author="Shreya Roy Chowdhury&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-6" date="1355832000">- Corrected Link state display information for Qlogic Adapters
- Added MSA G3 support in Scsi_info.h</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 3.3-6" date="1557316800">-Separated code stream for RHEL and SLES</changelog>
    <changelog author="Ratna Dey&lt;rathna.dey@hpe.com&gt; and Aravinda Rajanna &lt;aravinda.rajanna@hpe.com&gt; 4.1-1" date="1561550400">-Initial support added for E4 and will get updated subsequently</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1563451200">-Fixed adpater_info code to display correct Vendor name instead of Unknown</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1564056000">-Removed Brocade HBAs support</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.2-1" date="1630584000">-Removed adapter_info_nx code for E4 adapters</changelog>
  </package>
  <package pkgid="b43fc7beae6e5e2c621916585de9c4d6da1b83e25537e5827d1d31ebbe643b05" name="firmware-d3000" arch="x86_64">
    <version epoch="0" ver="5.04" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04-2.1" date="1534852800">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v155369/D3000_P07231-002.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04-3.1" date="1540209600">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v157942/P07231-003.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.12" date="1551700800">-     *The following fixes were incorporated in this version:**
    
      * Fixed TLB exception during upgrade from Rev build 1.11.000 to 0412.000
    
      * Fixed expander bootstrap task which failed with 0xB1 error code appearing in the console due to missing NVRAM tag - Product Name
    
      * Enabled-ClusterS2D command that does not complete with SATA drive in D3610
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v154196/D3000_P07231-004.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v177052/D3000_P07231-006.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-2.1" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-2.1" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v191363/D3000_v5.04B.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-3.1" date="1636977600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-3.1" date="1637064000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v202692/20-D3000-Gen10RN504C_ED3.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-7.1" date="1683892800">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v234600/20-D3000-Gen10RN504G_ED7.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="299b641fd20e7baaa36c759c87b2a40923292ab7978398a15ceac2c9a9d15028" name="firmware-d3000" arch="x86_64">
    <version epoch="0" ver="6.00" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.00-1.1" date="1683892800">-     *The following fixes were incorporated in this version:**
    
      * Code optimization to save memory repo.
    
      * TLB exception seen while doing esp reset when expander reset was in progress.
    
      * Added the psoc 8.93 binary in peripheral images, updated the reveille version numbers.
    
      * Added whole new Delta PS-pmbus code , Updated the ESP version number.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1808229885/v234599/20-D3000B-Gen10RN600A_ED2.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="c3ebd68fbf8d787273c942ed18340d3b6d21e536709bf00c84b9e5c8cce124f8" name="firmware-d6020" arch="x86_64">
    <version epoch="0" ver="2.74" rel="14.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-4.1" date="1572955200">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v172139/D6020_P07232-006.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-5.1" date="1586347200">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 8</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-5.1" date="1586433600">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v177006/D6020_v274_RN.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-7.1" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-7.1" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v183133/D6020_P07232-008.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-9.1" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-9.1" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v191364/D6020_v2.74I.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-10.1" date="1636977600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-10.1" date="1637064000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v202690/20-D6020-Gen10RN274J_ED8.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-14.1" date="1683892800">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v234598/20-D6020-Gen10RN274N_ED12.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="63215d7235f6f29d8ca31db1729a458a78a9708af38299e8e5eda146cd11cf1d" name="firmware-d8000" arch="x86_64">
    <version epoch="0" ver="0130" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0105" date="1572955200">-     *The following fixes were incorporated in this version:**
    
      * SAS drive LED behavior was corrected to align with the Smart Array specification, specifically: 
        * The Activity LED of a sanitize erase drive now turns ON when connected.
    
        * The Array present LED now turns ON for the SAS drive.
    
        * The Activity LED now blinks on all drives during a SAS drive rebuild.
    
      * The Serial Output Buffer (SOB) has a fixed sized for stored entries. Now, when the buffer is full, the oldest entries are cleared or committed to persistent storage (if available). For this reason, subsequent requests to read the SOB only retrieves new entries that have been logged since the last successful request to read the SOB.
    
      * The drive activity LED has been changed to a function as described in the installation and maintenance guide.
    
      * The reboot flag was changed to issue a hard reset, which enables the service delivery subsystem (ZPSDS) information be shared across (expanded across) the internal expanders to all devices attached.
    
      * The drive activity LED on the SAS disk drives was changed to support the ACTIVE_LOW signal state. The ACTIVE_LOW signal state is the default operation state for most drives.
    
      * The SCSI WRITE BUFFER MODE was changed from activate to soft reset. This change improves the host ability to detect and report whether the enclosure is going to perform a disruptive or non-disruptive activation after a firmware upgrade.
    
      * With I/O module firmware v0105 and PQI firmware 2.02 , the slot power cycle issue has been resolved by changing the power cycle SES request to return a failure when a partner slot is not connected.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v172138/D8000_P20366-002.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0107" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0107" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * In STD INQUIRY RESPONSE, the ErrM bit was always being set. The ErrM bit indicates that the enclosure firmware detects a mismatch in any of its package versions and the firmware version of a FRU component. The issue was due to an incorrect version of PSU firmware being included and that has been fixed.
    
      * After installing the latest firmware on the enclosure I/O modules, the SES targets could not be discovered on the host. The virtual phy bit in SMP DISCOVER RESPONSE, which is used by the Microchip smartpqi HBA, was det for the virtual phy of the I/O module.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v183134/D8000_P20366-004.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0111" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0111" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * Incorrect programming of the PHY ERROR COUNTERS parameter caused the amber LED to be lit, resulting in a false warning. The counter condition was corrected and the amber LED now functions correctly.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v191365/D8000_v0111.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0118" date="1635163200">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0118" date="1635249600">-     *The following fixes were incorporated in this version:**
    
      * User was not able to collect ddump logs.
    
      * Logical Fault LED remains ON even after clearing the fault using "reboot soft"
    
      * Vendor ID showed as "DEFAULT" for D8000 expander in SSACLI enclosure detail
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v203448/20-D8000-Gen10RN0118_ED1.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0130" date="1667304000">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0130" date="1667390400">-     *The following fixes were incorporated in this version:**
    
      * Smart Array reporting "Storage Enclosure FW upgrade Problem Detected".
      * PSU version is showing as "No Ver" after inserted the New bel power PSU.
      * GEM_5_2 Coverity defect fix.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v218471/20-D8000-Gen10RN0130_ED1.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0130-2.1" date="1683892800">-     *The following fixes were incorporated in this version:**
    
      * Smart Array reporting "Storage Enclosure FW upgrade Problem Detected".
      * PSU version is showing as "No Ver" after inserted the New bel power PSU.
      * GEM_5_2 Coverity defect fix.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v234513/20-D8000-Gen10RN0130B_ED3.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="5c360821b10aa1ad6e60d38fdde1d58c4203baf08f91ae6410de1d398e64d151" name="firmware-dcpmm" arch="x86_64">
    <version epoch="0" ver="1.2.0.5446" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5375" date="1561982400">-     Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5435" date="1585742400">-     Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5435-2.1" date="1599220800">-      Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.
      * This product contains mainly performance improvements.
      * This product now supports Red Hat Enterprise Linux 8 and SUSE Linux Enterprise Server 12.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5446" date="1626782400">-      Add RHEL8.4 and SUSE15 SP3 support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5446-2.1" date="1653480000">-      Add RHEL9.0 support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0.5446-3.1" date="1659182400">-</changelog>
  </package>
  <package pkgid="39fc4eac16d3f19488ee84af514f4ab0cbe997b5a7eee1208d9be8347cfc910f" name="firmware-dcpmm" arch="x86_64">
    <version epoch="0" ver="2.2.0.1553" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553" date="1622462400">-     Initial release of Firmware for HPE Persistent Memory for Gen10 Plus Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553-2.1" date="1624276800">-     This product corrects an issue that three different capacities of Intel Optane
    DC Persistent Memory are identifiable with three individual device GUID.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553-3.1" date="1653393600">-      Add RHEL9.0 support.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553-3.1" date="1653480000">-     This product corrects an issue that three different capacities of Intel Optane
    DC Persistent Memory are identifiable with three individual device GUID.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.2.0.1553-4.1" date="1659355200">-     This product corrects an issue that three different capacities of Intel Optane
    DC Persistent Memory are identifiable with three individual device GUID.</changelog>
  </package>
  <package pkgid="6ccf0b4aefe3fad5042042971f96af53059bdf80461ec2710e94e787237788d8" name="firmware-dl20gen10plus_me" arch="x86_64">
    <version epoch="0" ver="06.00.03.505" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.035" date="1646568000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.039" date="1646654400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the System ROM contains updates aligned with the Tatlow PLR2
    BKC WW50.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.200" date="1653566400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the MCTP PCIe devices could not be discovered after
    an SPS firmware update without an AC power cycle. This issue is not unique to
    HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.204" date="1667908800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version is in compliance with Intel IPU.2022.3 guidance.
    
    The following vulnerabilities have been addressed in this SPS release:
    CVE-2022-29515. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676289600">-     This version is in compliance with IPU.2023.1 guidance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2022-36794. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.505" date="1688040000">-</changelog>
  </package>
  <package pkgid="320010951875bb88d320ea1319ad91200a2d56a7c55f9a7db924eb6a4643561d" name="firmware-dl20ml30gen10sps" arch="x86_64">
    <version epoch="0" ver="05.01.04.913" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.113" date="1591617600">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for a variety of security vulnerabilities. The
    following vulnerabilities have been addressed in this SPS release:
    CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.208" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623067200">-     See the release document in Download Product Binaries page from Product
    Summary of the firmware product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2020-24509.
    These security vulnerabilities are documented in Intel Security Advisory
    INTEL-SA-00459.  These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.400" date="1644321600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2021-0060. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.500" date="1652184000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.600" date="1660046400">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.2 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.700" date="1667908800">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.804" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.913" date="1689249600">-</changelog>
  </package>
  <package pkgid="014b738f6da06483404866ae9c1d9eb25cc289bb676d89cee66e37e5d2757d31" name="firmware-fc-emulex" arch="x86_64">
    <version epoch="0" ver="2023.08.01" rel="1.9"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.03" date="1625486400">-     This is a fibre channel component.
    
    Added support for the following:
    
      * Code update to support new flash vendors
    
    Contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.352.24
    
    12.8.352.24
    
    12.8.352.10
    
    12.8.352.5
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.352.24
    
    12.8.352.24
    
    12.8.352.10
    
    12.8.352.5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.10.01" date="1632830400">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.12
    
    12.8.528.12
    
    12.8.528.10
    
    12.8.502.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.11.01" date="1635508800">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.03.01" date="1648641600">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.08.01" date="1656936000">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.08.01-2.9" date="1658318400">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.09.01" date="1658404800">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.10.01" date="1671451200">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.03.01" date="1673179200">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.08.01" date="1673265600">-</changelog>
  </package>
  <package pkgid="06de05a32daa00cbdb7332c84359c9de0c6ee22d3ab0d1e54290f1ceeef326c5" name="firmware-fc-qlogic" arch="x86_64">
    <version epoch="0" ver="2023.09.01" rel="1.8"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.02.01" date="1615204800">-     *Fixed the following:-**
    
      * Enhancements have been made to the firmware to prevent and better recover from any stoppage as described in Customer Advisory available at [https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us](https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us)
      * Fixed a behavior where the number of active Input/Output (IO) exchanges could be reduced under certain fabric conditions, resulting in reduced performance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.10.01" date="1632398400">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.75.07
    
    9.06.02
    
    7.04
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.05.03
    
    09.06.02
    
    7.11
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.05.03
    
    09.06.02
    
    7.11
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.08.01" date="1656936000">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.06.27
    
    09.09.00
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.08.27
    
    09.09.00
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.09.01" date="1658750400">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.06.27
    
    09.09.00
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.06.27
    
    09.09.00
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.10.01" date="1671451200">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.01
    
    09.09.00
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.01
    
    09.09.00
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.03.01" date="1674820800">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.03
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.03
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.03
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.03
    
    09.09.20
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.04.01" date="1678449600">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.04
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.04
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.04
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.04
    
    09.09.20
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.04.02" date="1678536000">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.06
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.06
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.06
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.06
    
    09.09.20
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.04.02" date="1678622400">-     The Firmware fixes the following:
    
      * Unsuccessful read of the SFP Temperature which will trigger a Server Shutdown. 
      * Message related to a Mailbox 0x48 Firmware dump saved to buffer.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.09.01" date="1678708800">-     Fixed the following behavior:
    
    Temperature Misreading: the adapter was reading incorrect reading of the
    temperature on the HPE SN1610Q 32Gb Fibre Channel Host Bus adapter's Small
    Form-factor Pluggable. The symptom would result in a temperature spike and
    potentially reset the system</changelog>
  </package>
  <package pkgid="4d176cae87440919754cc157fbdbd87fcfb8498b46bbc3909437eaa2b928862f" name="firmware-hca-mellanox-vpi-connectx4" arch="x86_64">
    <version epoch="0" ver="1.0.15" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10-2.1" date="1628769600">-     *Following issues have been fixed in firmware version 12.28.1002:**
    
      * An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **No fixes are included in firmware version 16.31.1200.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1632657600">-     *Firmware for the following devices are updated to 12.28.2006:**
    
    825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)  
    825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **New Feature and Changes in Version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    
    
    **Firmware for the following devices are updated to 16.31.1200:**
    
    879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)  
    872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)  
    
    
    **New features and changes included in version 16.31.1200:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX vectors per physical PCI functions.To use this feature, please follow these steps: 
        *   Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
        *   Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
        *   Configure PF_NUM_PF_MSIX per physical PCI function.
      * RDMA partitioning and RDMA counters in IB mode.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  the DQPN.
      * Added a new NVconfig per Port for a specific Finisar module. This new NVconfig sets the port to work in AN mode and sets the module to No DME. This change does not affect the speed logic, only the FEC logic (FEC override). **Note:** If the port does not go up, switch to Force mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1632744000">-     *Following issues have been fixed in firmware version 12.28.2006:**
    
      * An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1200:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1648468800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)
      * 825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.32.1010:**
    
      * 879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)
      * 872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    
    
    **New Features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    
    
    **New features and changes included in version 16.32.1010:**
    
      * Added support for blocking unwanted GMP classes by dedicated MADs.
      * Added a new NvConfig parameter LOG_MAX_QUEUE to set the maximum number of work queue resources (QP, RQ, SQ...) that can be created per function. The default value is 2^17.
      * Added a Congestion Control Key to all Congestion Control MADs to authenticate that they are originated from a trusted source.
      * Added an SMP firewall to block the option of sending SMPs (MADS sent on QP0 from the Subnet Manager) from unauthorized hosts to prevent fake SMPs from being recognized as the SM.
      * Vendor Specific MADs Class 0x9 is no longer supported by the firmware. In case the firmware detects such MAD, the firmware will return a "NOT SUPPORTED" error to the user.
      * Blocked the VF's ability to use both padding and signature in order to prevent the NIC from getting into an unresponsive state.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its rate limit.
      * Performance improvements in the DCT with AR flow by exposing a hint to the software in DCI software context that indicates that RDMA WRITE on this DCI is not supported.
      * Added support for dynamic timeout mechanism when in InfiniBand mode.
      * Added support for QSHR access register to enable Set and Query rate limit perhost per-port.
      * The firmware now exposes a new Software Steering ICM resource for VXLAN encap expand in order for the SW Steering to manage this resource directly.
      * Added support for asymmetrical VFs per PF. To enable it: PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a none zero value.
      * Added 2 new MAD access registers to enable mlxlink to read/write access registers by LID (to the whole subnet).
      * Enabled the exposure of new ICM resource to the software steering for VXLAN encapsulation expansion.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Disabled VST on dual port adapter cards when one port is configured as ETH and the other as IB as VST is not available when the port is set as ETH.
      * Added support for DSFP AOC (CMIS) v4 when error code is not reported by the module.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1648555200">-     *Fixes in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed n issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.32.1010**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * The system got into an unresponsive state when a peer port went down while using an Optical module.
      * Invalid RNR timeout when trying to set it during the rts2rts_qp transition.
      * A fatal assert 0x81C5 occurred when calling get_vport_mad from the MAD APIs. The firmware was trying to compute the number of vPorts using a global function number. To avoid this issue, the API was updated to remove any assumption on the function number. Note: This issue is affects only IB devices.
      * During events, stress caused the firmware to reset the Arm host of the vPort without sending an event. Thus preventing the software from rearming the vPort as it did not receive any event, and the firmware did not send the event because the vPort had no Arm set.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.
      * An issue related to the sl2vl mad that caused a few msec hiccup in the transmission on an InfiniBand network when the SM sent the sl2vl mad to a node in the cluster.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13" date="1663156800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)
      * 825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.33.1048:**
    
      * 879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)
      * 872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    
    
    **New Features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    
    
    **New features and changes included in version 16.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13" date="1663243200">-     *Fixes in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.33.1048**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.14" date="1680436800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)
      * 825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.35.1012:**
    
      * 879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)
      * 872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    
    
    **New Features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    
    
    **New features and changes included in version 16.35.1012:**
    
      * Added support for copy modify header steering action to/from the UDP field.
      * Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.
      * QoS priority trust default state can now be changed using the new nvconfig below: 
        * QOS_TRUST_STATE_P1
        * QOS_TRUST_STATE_P2
    
    The values that can be used to set the default state are:
    
      * TRUST_PORT
      * TRUST_PCP
      * TRUST_DSCP
      * TRUST_DSCP_PCP</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.14" date="1680523200">-     *Fixes in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions. 
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15" date="1692446400">-     *The following issues have been fixed in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
  </package>
  <package pkgid="e8063605d768f4dc110d0154db725fafc42ced8593936ae5309a3d58ec1261c9" name="firmware-hca-mellanox-vpi-eth-ib" arch="x86_64">
    <version epoch="0" ver="1.0.12" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8-2.1" date="1571054400">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5044:**
    
      * Fixed an issue that  prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode 
    
    **Fixes in version 2.42.5052:**
    
      * Fixed Uncorrectable Machine Check Exception issue. The internal resources for handling packets were not allowed to be flushed when the driver was brought down and occasionally caused Red Screen of Death (RSOD). The fix was applied to the ROM code only and has only external timing influences upon the driver's teardown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1572868800">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5052:**  
        764283-B21  
        764284-B21  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1572955200">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5052:**
    
      * Fixed Uncorrectable Machine Check Exception issue. The internal resources for handling packets were not allowed to be flushed when the driver was brought down and occasionally caused Red Screen of Death (RSOD). The fix was applied to the ROM code only and has only external timing influences upon the driver's teardown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1592395200">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1592481600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1601899200">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21
    
    **Firmware for the following device is updated to 2.42.5700:**  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.
    
    **New features and changes in firmware version 2.42.5700.**
    
      * Modified the mlx_cmd_get_mlx_link_status command return value to return "Link Type = Ethernet" in Ethernet adapter cards.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1601985600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1614254400">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21
    
    **Firmware for the following device is updated to 2.42.5700:**  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.
    
    **New features and changes in firmware version 2.42.5700.**
    
      * Modified the mlx_cmd_get_mlx_link_status command return value to return "Link Type = Ethernet" in Ethernet adapter cards.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1614340800">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12-2.1" date="1658923200">-     *The following changes have been made in sub-version 1.0.12(A):**
    
      * Product rebuilt to have the new SHA 384 signature.
    
    **Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
  </package>
  <package pkgid="40cd087348b7e0ae31517d0dea6f22cde6c0d7d568f61d3953e6461533dca834" name="firmware-hca-nvidia-crayxd-vpi-cx6" arch="x86_64">
    <version epoch="0" ver="1.0.3" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.1" date="1671537600">-     Security Hardening Enhancements: This release contains important reliability
    improvements and security hardening enhancements. HPE recommends upgrading
    your device's firmware to this release to improve the firmware security and
    reliability of your device.
    
    
    
    **New features and changes included in version 20.35.1012:**
    
      * Added support for copy modify header steering action to/from the UDP field.
      * Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.
      * QoS priority trust default state can now be changed using the new nvconfig below:
    
    QOS_TRUST_STATE_P1  
    QOS_TRUST_STATE_P2
    
    The values that can be used to set the default state are:
    
    TRUST_PORT  
    TRUST_PCP  
    TRUST_DSCP  
    TRUST_DSCP_PCP</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.1" date="1671624000">-     *The following issues have been fixed in version 20.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * The RXT E2E inflight went into an unresposive state occasionally.
      * RDMA partition was reported even if NIC+RDMA mode was disabled.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * An incorrect address issue for XRQ Event Backend Controller Px Syndrome event in multi-host system during FLR.
      * PCIe SKP OS generation interval issue for Gen1 and Gen2.
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.2" date="1684670400">-     Security Hardening Enhancements: This release contains important reliability
    improvements and security hardening enhancements. HPE recommends upgrading
    your device's firmware to this release to improve the firmware security and
    reliability of your device.
    
    **New features and changes included in version 20.36.1010:**
    
      * Enabled provisioning of the OEM public key that is used for OEM NVconfig file signature verification.
      * Enabled constant clock offset (visible using PPS out) when synchronizing the device using PTP in 25G or 10G port link speed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.2" date="1684756800">-     *The following issues have been fixed in version 20.36.1010:**
    
      * Aligned RDE behavior to DSP0266 v1.15.0  table 23.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1691668800">-     *No new fixes have been included in version 20.37.1700**</changelog>
  </package>
  <package pkgid="2c678e663c7765799958177f79441d651b34f04d579d2885234dfcbdcf2f058f" name="firmware-hdd-020fc874ad" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1673524800">-      Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</changelog>
  </package>
  <package pkgid="e2e3ed6234f5b440584d181c00ec085a3c867370be8f5efa01c414939efd90fa" name="firmware-hdd-035a863453" arch="x86_64">
    <version epoch="0" ver="HPK5" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652702400">-      This Firmware release contains various drive interoperability enhancements and code fixes accumulated since the last firmware release, as well as a change to disable MCTP over PCIe VDM function per requested of HPE, and a PHY setting change for improved compatibility with Intel Ice Lake based Gen10 Plus DL360 platform. 
      * For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00115201en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5" date="1671105600">-      Fixed an incompatibility issue in MCTP over PCIe VDM function
      * Updated WCTEMP value for thermal throttling threshold</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-2.1" date="1674820800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-2.1" date="1674907200">-      Fixed an incompatibility issue in MCTP over PCIe VDM function
      * Updated WCTEMP value for thermal throttling threshold</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1674993600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1675080000">-      This component provides support only for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1675166400">-      Fixed an incompatibility issue in MCTP over PCIe VDM function
      * Updated WCTEMP value for thermal throttling threshold</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-4.1" date="1688817600">-</changelog>
  </package>
  <package pkgid="54a33b2100d4a7ceb43ff8936edd2bfb518af3a466fc74f34c7c39697fa2b1a7" name="firmware-hdd-059b8654a6" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1624017600">-     Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to
    HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="5e4fb56f8f3ee174d18d16f6522fa6f8b31738b77fc63e0f6d0bc9e4958bebcc" name="firmware-hdd-0a7010918e" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1656590400">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
  </package>
  <package pkgid="cfdaa17b6a9c5f828c32f9748743645bf3ecddbd32d6654d0e90c9f3ff8743cc" name="firmware-hdd-0a7d4aa47f" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1656590400">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
  </package>
  <package pkgid="1214aea37ef5db7c9d23fd662fe4a9dcb72645ab4254ea90beb983fae183d7a7" name="firmware-hdd-10385ef3e6" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="50b84dd5ceb74ff68b7ca9bc900de9598a9606da7d7506b245ca73c118d33a12" name="firmware-hdd-12304c1aca" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1594814400">-       Added support for RHEL 8.2.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1594900800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1594987200">-      This update includes a fix that prevents unrecoverable read errors in highly localized write intensive workload, and a new servo code revision that improves performance under specific vibration conditions.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1656590400">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
  </package>
  <package pkgid="cfdf5e906093a118d1673db588f7fc8ad21242ffe37599d36e75d395953faf5a" name="firmware-hdd-1656c1b14a" arch="x86_64">
    <version epoch="0" ver="4ICDHPK1" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1" date="1614772800">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.
      * After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-2.1" date="1632312000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-2.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-2.1" date="1632484800">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.
      * After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-3.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-3.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-3.1" date="1652702400">-      This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.
      * After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-4.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICDHPK1-5.1" date="1675166400">-</changelog>
  </package>
  <package pkgid="e687d841d4b3e63040370b488b9b4a426619ec48e7b1f53eca64e48447eb3d94" name="firmware-hdd-18e328f036" arch="x86_64">
    <version epoch="0" ver="HPG7" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1614772800">-       Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7" date="1664366400">-      Fixed an intermittent issue where the incorrect model number can be reported during spin-up</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-2.1" date="1671105600">-      Fixed an intermittent issue where the incorrect model number can be reported during spin-up</changelog>
  </package>
  <package pkgid="53ef1c13330591175eaef19fd5a88672f6a58bf96eff2ccce300296bba89463d" name="firmware-hdd-1a541ed00d" arch="x86_64">
    <version epoch="0" ver="GPK4" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3" date="1647950400">-      Fix FW issues and add thermal feature requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK4" date="1673265600">-      Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</changelog>
  </package>
  <package pkgid="d53d3e937ac1ea86b6d38d63535db470a77268cc61bcd8cde57079e7c26e256c" name="firmware-hdd-1d7f19120b" arch="x86_64">
    <version epoch="0" ver="HPGB" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-8.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-9.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-9.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-9.1" date="1632484800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-10.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-10.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-10.1" date="1652702400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGB-11.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="a923816be1e6a7310e0d6bfa7175eb8b816941b03ca2cbde91e0cf901cafd12a" name="firmware-hdd-1e51a57347" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-7.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="1ae17460a84a67b551f60a0f86ad6e416429d34d0da82cf195099b403c7f8344" name="firmware-hdd-24384980ec" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1615809600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1615896000">-      VENDOR IDENTIFICATION field change from "HP" to HPE". Support for second source PMIC from IDT.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="31f32836e1a6f5948bb61e26f01a05ad99da895250cd0fa63c1ae25691058930" name="firmware-hdd-24fe569b72" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1628078400">-     This firmware fixes a potential reliability condition and the cause of a
    potential hang.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1639915200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1640001600">-      This firmware mitigates a potential reliability concern.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1657281600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1657368000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1657454400">-</changelog>
  </package>
  <package pkgid="302260fe51082a09505f98ef37bc32c70014759a4f2e8aa70c28e7dac6b6b2e6" name="firmware-hdd-252770cdda" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-10.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="8b0f05f60b1f898a36ebf41b6a46d89f84e56d9755e47e00fa52ca38d8dd2e94" name="firmware-hdd-2af7385a1e" arch="x86_64">
    <version epoch="0" ver="HPK7" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-5.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-5.1" date="1652702400">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6" date="1652961600">-      Main fixes are for Secure boot(Option ROM) ILO error and critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-2.1" date="1661256000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-2.1" date="1661342400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-2.1" date="1661428800">-      Main fixes are for Secure boot(Option ROM) ILO error and critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-3.1" date="1681300800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-3.1" date="1681387200">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK7" date="1688126400">-      Maintenance release with fix for LED off during idle</changelog>
  </package>
  <package pkgid="164d94a3a9aac50ffbeb2d6a4e458b173d44bed1b41c5cdf6d826496f55d903c" name="firmware-hdd-2c27a7a9a4" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1628078400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1628164800">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="f90de7dd5ae3ddd74e541e903a62618dafaa810b714c77301b26f8639ea7a7a5" name="firmware-hdd-2cfaac41db" arch="x86_64">
    <version epoch="0" ver="HPDB" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-11.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="c145abdbe66f8f7217338bc55c0b474341e231e559ddaa87697f4ef140d06b80" name="firmware-hdd-2e4c61fc63" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1617105600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652702400">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1657108800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1657195200">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1657281600">-</changelog>
  </package>
  <package pkgid="177833fb97975ca9a35ebb722219537b614fcd00a5b4e28084e1d397dd84a48a" name="firmware-hdd-3243fce9a0" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="a1dc38eda7cb02fb81e071c84cf3104f3c121ff9ad8ea51f91538992720799b5" name="firmware-hdd-3496cc4743" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1673784000">-      Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</changelog>
  </package>
  <package pkgid="994c6ffc62a124efad112ebc5f89948a9657018c7d0ad97f8ca33ef8e1d9c030" name="firmware-hdd-35fd24601f" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1690459200">-      Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</changelog>
  </package>
  <package pkgid="f9b5d04a79f7b672c2318568c20dd09e64c1cc24b5cf3de4526b0c9266b69a68" name="firmware-hdd-3815d4b024" arch="x86_64">
    <version epoch="0" ver="GPK6" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3" date="1626868800">-     This Firmware release address below fixes and additional features:
    
      * FW Transfer Fix
      * Drive Failure Fix
      * Power Loss Protection
      * FW Download Fix
      * Reset Fix
      * Shutdown fix
      * PCIe Improvement
      * Random Write Improvement</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1632139200">-      .Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1632225600">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1632312000">-      Added support for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5" date="1647950400">-      Fix FW issues and add thermal feature requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK6" date="1673265600">-      Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</changelog>
  </package>
  <package pkgid="6a4b1eb1ccb66b16d02e73e97bbd5c89bc89b406a56f68e8fc856cc07a260170" name="firmware-hdd-3ab4c70e64" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-13.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="923f150f0e9f3a8a794fa63185675dd32ba3220015f3bffde3541d2794b95789" name="firmware-hdd-3d97759111" arch="x86_64">
    <version epoch="0" ver="HPDA" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1647864000">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1670932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1671019200">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1689422400">-      Optimize sensor reporting to improve failure rate - AFR (Annual Failure Rate) metrics</changelog>
  </package>
  <package pkgid="299965c99bc863b47d281f37b3680b024e1c9667aa787cfc2e8f218be5560f5c" name="firmware-hdd-3db7640485" arch="x86_64">
    <version epoch="0" ver="HPGG" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-5.1" date="1613390400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613476800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613563200">-      Improvements to Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="6df579d1d1c0307ad4338a86ca17e8c00c423fb0796e7881970e94d428c9cb00" name="firmware-hdd-41cdb1c9da" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="a440f0962dcb730d277234e8685c22ed023476540d55b26bf3ce97ae7744cfeb" name="firmware-hdd-42aff4675b" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1626004800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1626091200">-     Firmware release to enable SAS4.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1640174400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1640260800">-      Fix command timeout and uncorrectable error improvement.
      * Added features for SAS4 auto power swtiching and thermal requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="5b36d7c13a8c3093ce147822c199e8175b3d895d7ea9d1555718231895a5dbfe" name="firmware-hdd-46fc43ab26" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-10.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-10.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-11.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="00770431f84c720d682719e3b0318f5d7754f43e3ae78a4e3087119d505ea0c0" name="firmware-hdd-481c8ea9a7" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1614600000">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1614686400">-       Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="6b75accb300c22b48e5c7d7ed1321b229cb7fa9456d743eda1cb0c862e2008ca" name="firmware-hdd-492a9952f6" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1614772800">-      This maintenance FW release addresses a rare corner case COMRESET issue at warm boot, and to address an early EOL behavior under certain use cases.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1630411200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1630497600">-     These firmware release add a foreground media scan policy to prevent a
    Predictive Failure and add SMART Attribute value for the FMS count.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1660219200">-      Fixes the issue that certain SSDs may report false predictive failure in the integrated management log (IML).</changelog>
  </package>
  <package pkgid="82c73a88c1b905754c39d51edb9a81a3230f470df7a52d394cc576c4f9c3fd94" name="firmware-hdd-4b4177239b" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1630584000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1630670400">-      Improved Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1648555200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1648641600">-      Firmware Capacity charge timeout threshold is increased to 14 seconds.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="364aa4ca9b713897b7e7b7ae4cf71dab6b15caf42b2363560a772a2eca389741" name="firmware-hdd-4ba9615f90" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1614600000">-      This firmware fixes an issue that, under extremely rare conditions, can cause a data miscompare. It eliminates causes of some potential timeouts and hangs. It also addresses some temporary performance degradation conditions.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1627992000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1628078400">-     This firmware release provides additional protection against command timeouts.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1629806400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1629892800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1629979200">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652702400">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="69adde3d4494cd581b4ee141751685e665d5c35e49108b6492a09be99ec942b5" name="firmware-hdd-4c048aaeb0" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="c40fb75e0b3dc8844ff86ea3b287e7e8c3bd4e5d002fca94fb39fa6a7dff851f" name="firmware-hdd-4fbb6d96e5" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1656590400">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
  </package>
  <package pkgid="b1d9bd90d9f434b5c1b42a0dc6fd991a90fcf85362f840f0eb0eba3c8a1ae232" name="firmware-hdd-54addf5312" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-2.1" date="1613995200">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1616587200">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1617278400">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1632312000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1632484800">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-7.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-7.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-7.1" date="1652702400">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-8.1" date="1657022400">-</changelog>
  </package>
  <package pkgid="46a78d6d6da5ec895b05a8c306252e650970d9749546269c30dfbf076e2c1da5" name="firmware-hdd-5bf9355926" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="4dd4873b42ab52ab3621c274d4b262a350fc328fa2c8fecf48978b528f225632" name="firmware-hdd-5dcf26fa42" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="efd6a225d3cf46c9e1222dfe7820e41fb7168c69246b294392247d11fee12c0c" name="firmware-hdd-624b75c7e2" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1632484800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1652702400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="e17b5e0286ab410de851ee63cfab95c771c57feabc7c9cdafc8a737bfd579cb3" name="firmware-hdd-6628fce235" arch="x86_64">
    <version epoch="0" ver="EPK76H3Q" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-3.1" date="1630497600">-      Fixed False UECC issue at idle power mode.
      * Old FW download Blocking (EPK70H3Q~EPK74H3Q).
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-4.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-4.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-4.1" date="1652702400">-      Fixed False UECC issue at idle power mode.
      * Old FW download Blocking (EPK70H3Q~EPK74H3Q).
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q" date="1652961600">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q-2.1" date="1661256000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q-2.1" date="1661342400">-      Added support for RHEL 9</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q-2.1" date="1661428800">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q-3.1" date="1675166400">-</changelog>
  </package>
  <package pkgid="cb0be98b62a00ffd283f814ffe1b623c11a68b0075f23ec054028b9711f881a4" name="firmware-hdd-6758a46eb7" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3" date="1666180800">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3" date="1666267200">-      OCP v2.0 feature support 
      * NVMe-MI over PCIe VDM support 
      * Bug fixes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3-2.1" date="1674820800">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3-2.1" date="1674907200">-      OCP v2.0 feature support 
      * NVMe-MI over PCIe VDM support 
      * Bug fixes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3-3.1" date="1674993600">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3-3.1" date="1675080000">-      This component provides support only for VMD enabled Intel VROC platform..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3-3.1" date="1675166400">-      OCP v2.0 feature support 
      * NVMe-MI over PCIe VDM support</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1688126400">-      Reverted OCP spec features to maintain compliance to OCP spec commands over NVMe-MI
      * Implemented real Active Measured Latency by adding OCP 2.0 C3 Log page</changelog>
  </package>
  <package pkgid="7d3300487659e4191f5122691b31d4af086c8039097192b1be219e45b5daad67" name="firmware-hdd-68b12e54d2" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="d952aae514f815392b1c575562e624107b428d28384d02f48344779a806c20d1" name="firmware-hdd-693b9a2853" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617796800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617883200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="b1501448e6b98e5f8445438bd19396ec855bf0a1f5a82aa828b7eabfe04c5d80" name="firmware-hdd-6b7ce3da0e" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="17270c63a5f8c550281fd51fd2989a7148bea369d2c762ae9dc3f43cea185e1c" name="firmware-hdd-6ec35faf90" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1614772800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1623153600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1623240000">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="b3ce4fbe0f856ad6e5fba18e615bc7a1e5a9e03795aaff671702f6c2f81eb1a4" name="firmware-hdd-6fc985bd3b" arch="x86_64">
    <version epoch="0" ver="GPK6" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1631534400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1631620800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1631707200">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1631793600">-      Added support for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5" date="1647950400">-      Fix FW issues and add thermal feature requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK6" date="1673179200">-      Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</changelog>
  </package>
  <package pkgid="cc93dff8ed16bd6e93774739172a41967d5306926934e31e9b40ba750b4f768c" name="firmware-hdd-70e3962f98" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1632484800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1652702400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-11.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="7d1b7b2e06830dc6805185d654daa07f5081087bcc13925bf14925eb316aeb5f" name="firmware-hdd-71af849f3b" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-11.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="d5305cc8f9715189ca837ea16c7152b4f7e8faf718ac1634322b41d0b275dfd5" name="firmware-hdd-726d5ec795" arch="x86_64">
    <version epoch="0" ver="HPK2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1659009600">-      Fix for BIOS RSOD issue</changelog>
  </package>
  <package pkgid="6ec46ea76f6f39e9062c30690cd9407f7dfba695ae58a6a5a95c89f467f1c503" name="firmware-hdd-7505dfb5ae" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617105600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652702400">-      Added support for 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="da3a1d5e85ca8c5f59aee2264b6b99b320769601b422b50b0a053089de786085" name="firmware-hdd-7677644a25" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="228f81b6328ac384f90aa7e7feec2062ebbbec247e6cc7ba56bd6cc3befc8405" name="firmware-hdd-7a1edae8e7" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="9879582c43111b39d7b18ee5f5561cd13013f7809cc41aed116abc917e052a48" name="firmware-hdd-7f2a26e6d0" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="204354782bf6457c9a72c20218641f39284e51dc3fd49329d82c14809db6f105" name="firmware-hdd-7fc5497116" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617105600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="0a4243a31681cb99ba5b593ac2ef3d5a0d42456469cc7f88f14a5b80e79105ef" name="firmware-hdd-805abb7e9c" arch="x86_64">
    <version epoch="0" ver="85032G00" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85030G00-2.1" date="1598270400">-      Added Support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85031G00" date="1623240000">-      This is a maintenance release that contains various drive reliability enhancements and code fixes accumulated since the last initial release, as well as a change to disable MCTP over PCIe VDM function to satisfy certain HPE platform environments.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00" date="1635249600">-      Implements FW-based VPD.
      * ARP setting is changed from "Capable &amp; Discoverable" to "Fixed &amp; Discoverable".
      * A minor tweak to the Foreground Media Scan (FMS) algorithm to ensure critical variables are initialized properly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-2.1" date="1635336000">-      Added support for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-2.1" date="1635422400">-      Implements FW-based VPD.
      * ARP setting is changed from "Capable &amp; Discoverable" to "Fixed &amp; Discoverable".
      * A minor tweak to the Foreground Media Scan (FMS) algorithm to ensure critical variables are initialized properly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-4.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="7c6f4e47e07bc7f3a9ca71be39cc085e09e9553c3fc5c5d818fd0f6757d4ac96" name="firmware-hdd-8173816d98" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1664366400">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1671105600">-      Firmware addresses a hot plug reporting concern</changelog>
  </package>
  <package pkgid="4a4d6446ea816dc55211c49ac3c643ea002ac103f22579c08931dd210ae2ff1d" name="firmware-hdd-82894b9e0a" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="24260af1adf6bcae17149ca0fc69910bde996d9851f1b72651af3d43956bb28e" name="firmware-hdd-852266afdf" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1628078400">-     This firmware fixes a potential reliability condition, a rare data integrity
    issue and the cause of a potential hang.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1640174400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1640260800">-      This firmware mitigates a potential reliability concern.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1657281600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1657368000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1657454400">-</changelog>
  </package>
  <package pkgid="d8a5007cd9b7ec082ac9200c97ac929d27d44feef9d646a64fd9df0e536b104b" name="firmware-hdd-87b796d9ae" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1683115200">-      Improves data integrity
      * Decreases possibility of data corruption in certain error and timing conditions
      * Reduces the probability of hangs</changelog>
  </package>
  <package pkgid="30744b443b73d2eadcbdbccdc4a9a5932f30dee1f9817bdb4acc0658acf299a4" name="firmware-hdd-8a0371a425" arch="x86_64">
    <version epoch="0" ver="HPDA" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1629115200">-     This firmware revision corrects a rare situation where a Cryptographic Erase
    could result in random data instead of the expected deterministic zeros. This
    is judged as low severity because it does not compromise user data or
    security, but justifies the update to preclude potential security concerns.
    There are several items that reduce the probability of hangs and provide some
    minor performance improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1671105600">-      This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.
      * The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.
      * Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</changelog>
  </package>
  <package pkgid="191729d1837d5ca9ced2601a4c45297818e1700c09dbe051af4a46b7fc3505a5" name="firmware-hdd-8a2c06af48" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-12.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="94f96e3e45c7c90766b7b6946239008c0b85ce53a1905ecf0a1a4464def21300" name="firmware-hdd-8a7ecf7465" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1486555200">-     *Problems Fixed:**
    
      * Fixed an issue where wear usage was not being reported correctly in the SmartSSD Wear Gauge Utility</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1615809600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1615896000">-      If Power On Hours exceeds 70,000hrs, PM2R will report Hardware error (04/4C/A8) after the next Power Cycle and will not accept read/write commands. This fix will update storage location reporting when the maximum number of registrations in the Work Load Log read process reaches 70,000; the last registered 70,000th storage location will be modified to be read as the next (70,001st) storage location.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111296en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      If Power On Hours exceeds 70,000hrs, PM2R will report Hardware error (04/4C/A8) after the next Power Cycle and will not accept read/write commands. This fix will update storage location reporting when the maximum number of registrations in the Work Load Log read process reaches 70,000; the last registered 70,000th storage location will be modified to be read as the next (70,001st) storage location.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111296en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      If Power On Hours exceeds 70,000hrs, PM2R will report Hardware error (04/4C/A8) after the next Power Cycle and will not accept read/write commands. This fix will update storage location reporting when the maximum number of registrations in the Work Load Log read process reaches 70,000; the last registered 70,000th storage location will be modified to be read as the next (70,001st) storage location.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111296en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="219b16010a447a964a161eeeed4da14df00ba25f9c36a11c85b131fa779b1d47" name="firmware-hdd-8b26d1ef02" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1623240000">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="d293c32910526cab9a445a868506a0dceaf78183270810b1fa634fd7e7bd8577" name="firmware-hdd-8d68452816" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1628078400">-     This firmware fixes a condition that could cause the heads to land on the
    media in an emergency power off situation, and eliminates a command timeout
    issue. Some internal logging operations were refined at the same time.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652702400">-      Added support for RHEL9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661428800">-      Added support for RHEL9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664452800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664539200">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1671105600">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
  </package>
  <package pkgid="77b860c19c16dd8a1ec1b2ed49f0ac98bd279e908dc60d8c08f482621a5846e9" name="firmware-hdd-8e1e8083c5" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1614772800">-       Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1630670400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1630756800">-     This FW release deploys an Enhanced Media Scan algorithm that addresses an
    issue when the host system does not provide enough idle time for drive's
    Foreground Media Scan to be activated, which is needed to ensure long term
    drive reliability. It also addresses few minor issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1681646400">-      Improve the FW about data mismatch after SPL issued.</changelog>
  </package>
  <package pkgid="b99b39af8892224b159798def8029562abccf5ca2b5f89f70ae26fe2bf74bf13" name="firmware-hdd-8e8ddc5265" arch="x86_64">
    <version epoch="0" ver="HPK2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-2.1" date="1565611200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-3.1" date="1572955200">-      Added support for SLES15SP1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-6.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1646913600">-      Applied enhanced NAND recovery algorithm to prevent read UECC error
      * Prepare proper response data for Get Message Type Supported MCTP Command</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="01eb9eead1061d1407ab38be4cf384ae5d360bc86befe55ca32338f3ed7ad438" name="firmware-hdd-8ed8893abd" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="33b9458d35a9f1e8ccd267b4434bc1f9b8dc884553523a8f074630a6de629d9e" name="firmware-hdd-8f501d6cf1" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1640174400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1640260800">-      Fix command timeout and uncorrectable error improvement.
      * Added features for SAS4 auto power swtiching and thermal requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="be1b94e67a2e8cce018d2efd1bdeb6dae1058f829f84efe40e37ceba233d2bdc" name="firmware-hdd-8f9bf23306" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1621944000">-      The updates were included in a regularly scheduled 5300 maintenance release. This firmware has a security version upgrade to include TCGe SKUs and prevent a downloading of a back level firmware version of HPG0 after upgrading to HPG1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="08e8c8e628093c7de752e228e28e8304859bd61b2d0aee3179598ff67e27a72b" name="firmware-hdd-8fafc9efb2" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1652702400">-      Reduced the occurrence probability of PMIC busy issue. 
      * Fixed the system data error at the drive power on issue. 
      * When the PLP operation starts, the waiting Unmap request to the 4KB not-aligned host write area is canceled to be able to complete PLP correctly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1666180800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1666267200">-      Reduced the occurrence probability of PMIC busy issue. 
      * Fixed the system data error at the drive power on issue. 
      * When the PLP operation starts, the waiting Unmap request to the 4KB not-aligned host write area is canceled to be able to complete PLP correctly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666612800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666699200">-      Reduced the occurrence probability of PMIC busy issue by stopping PLP capacity check to reduce i2c access to PMIC.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1671105600">-      Reduced the occurrence probability of PMIC busy issue by stopping PLP capacity check to reduce i2c access to PMIC.</changelog>
  </package>
  <package pkgid="00980d75b47e245d5e7bccb19fd734fc98901c5525f52b6505da4657f59a65a1" name="firmware-hdd-9196d4f720" arch="x86_64">
    <version epoch="0" ver="HPGG" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGE-4.1" date="1613563200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613649600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613736000">-      Improvements to Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="9b5f2b86732103edaba7b050f62f4725f0c40eb1a0b3892e6c22dec72e13e052" name="firmware-hdd-92d876cfea" arch="x86_64">
    <version epoch="0" ver="4ICRHPK3" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-2.1" date="1618228800">-      The issue affects SSDs with an HPE firmware version prior to 4ICRHPK3 that may result in SSD failure starting at 4,700 hours of operation, neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111900en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-3.1" date="1632312000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-3.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-3.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to 4ICRHPK3 that may result in SSD failure starting at 4,700 hours of operation, neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111900en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-4.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-4.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-4.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to 4ICRHPK3 that may result in SSD failure starting at 4,700 hours of operation, neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111900en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-7.1" date="1689076800">-</changelog>
  </package>
  <package pkgid="53a2bfdcb4e54714ae72906aa26d9e266848c062f3a763ab4b1834f744d1d9ae" name="firmware-hdd-9475583fb5" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1673784000">-      Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</changelog>
  </package>
  <package pkgid="432eabeb2a6150b7f6e543514b0521fbb57f916db2d19e7d25b5d49658ebaf25" name="firmware-hdd-951aefd63e" arch="x86_64">
    <version epoch="0" ver="MPK7625Q" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q" date="1652961600">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-2.1" date="1661256000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-2.1" date="1661342400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-2.1" date="1661428800">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-3.1" date="1666180800">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-3.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-4.1" date="1674907200">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-4.1" date="1674993600">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-5.1" date="1675080000">-</changelog>
  </package>
  <package pkgid="c24af0e7938f2c532533ab359a78fcd774660ca29d1d3803cea193d2490972a0" name="firmware-hdd-95af9a555e" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-3.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1656072000">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
  </package>
  <package pkgid="47883776d9c5f5b11c741b77a4f44cfc615fac37875830649125ef3b13753e40" name="firmware-hdd-9ad359dac1" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1616414400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1616500800">-      Change Vendor Identification Field (VID data) from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="123f8b7500786c081d15bf50dd65abbc7ac63546576867fd4ce6065887d50ccd" name="firmware-hdd-9e87eecb3f" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611835200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1611921600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="8892e1285c224b24787fbe3b836c8e9841cd2ea331a6c977406c7f59e9689c9e" name="firmware-hdd-a05f29cef3" arch="x86_64">
    <version epoch="0" ver="HPDC" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1647864000">-      Firmware addresses a hot plug reporting concern.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB" date="1670932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB" date="1671019200">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-2.1" date="1672747200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-2.1" date="1672833600">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDC" date="1689422400">-      Optimize sensor reporting to improve failure rate - AFR (Annual Failure Rate) metrics</changelog>
  </package>
  <package pkgid="54e6ee0cfc3a97e1394a48781c7df5e6963b010a00ceeb5b767149f93f09f4a9" name="firmware-hdd-a07a420ed1" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1614772800">-      Modify Drive Vendor Identification String (VID) in Inquiry page from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1690459200">-      Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</changelog>
  </package>
  <package pkgid="39a0b1e0cd4e53a9174c707c9c4c6dab0fd7016d99739ee2642dcfc93451c016" name="firmware-hdd-a1fd19f9ca" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="4b4e8cfb8890dc7a45765a220d5dab82db7612e2771a2de161cfb8a4d961d509" name="firmware-hdd-a27c95663d" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1671451200">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1671537600">-      Added Relaxed Ordering feature in drive FW and fixed some bugs</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1674820800">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1674907200">-      Added Relaxed Ordering feature in drive FW and fixed some bugs</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1674993600">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1675080000">-      This component provides support only for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1675166400">-      Added Relaxed Ordering feature in drive FW and fixed some bugs</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1689854400">-      Fix bugs found in the previous version and improve on TTR (Time To Ready) requirement to fix device temporarily not found issue after hot-plug.</changelog>
  </package>
  <package pkgid="f3e2c71a8ca4c6caf849b4924fd60498b2927a0374565f29c6949005d381dae8" name="firmware-hdd-a886842a99" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1626264000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1626350400">-     Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to
    HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="95a465b1dc29c9674d5763c38e84e135bde14d1a65d40f1aaa09e2a61634ef27" name="firmware-hdd-a9843986b0" arch="x86_64">
    <version epoch="0" ver="HPK2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1659009600">-      Fix for BIOS RSOD issue</changelog>
  </package>
  <package pkgid="faed7c27af0d1f858c35640732cd6050c3369136a1264e3ce4f855667cb8b3d9" name="firmware-hdd-aa9e289524" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1621425600">-      This firmware version updates the Vendor ID in the standard inquiry to 'HPE', in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="36ba22cba5b1e8cb25a66eb0691bbf67889e30c707ec7cd13e080df74c2bdaf3" name="firmware-hdd-aaf1014ede" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1621944000">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="8e89edc6fdacb24665507ea359749d14d570c5c7a220de37e36813f95fd03f11" name="firmware-hdd-abd133f0de" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1673784000">-      Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</changelog>
  </package>
  <package pkgid="fd3e7453384c5503d14ace6325eb25d084bc72c4d94e139423c461cca39d4e6b" name="firmware-hdd-adb3ab8147" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1648641600">-      Firmware addresses a hot plug reporting concern.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664366400">-      Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670932800">-      Fixes an issue in previou version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1671105600">-      Fixes an issue in previou version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
  </package>
  <package pkgid="c050824ec7ed4803454c9a83437253215f7f1ae46cf01c4f5eae27b8a7e4618f" name="firmware-hdd-ae6b41e855" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1648641600">-     Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664366400">-      Fixes an issue in previou version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670932800">-      Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1671105600">-      Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
  </package>
  <package pkgid="30310af6d5a985c50564e3f7d74b4be48eff6f337f97576b5b7e1c628da66ceb" name="firmware-hdd-aef2a690c9" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614772800">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632484800">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652702400">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="cc31069879e7cf358ef9186d2c31a16aa110f767db6e10e1ad630490899f99e8" name="firmware-hdd-b04257b77b" arch="x86_64">
    <version epoch="0" ver="HPDA" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1624449600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1624536000">-     This firmware version updates the Vendor ID in the standard inquiry to 'HPE',
    in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1654862400">-      Firmware addresses a hot plug reporting concern</changelog>
  </package>
  <package pkgid="999f056598de1f72e6f0bc7aac5a2fc65c14f68f91534c6d98cf724b4cf24104" name="firmware-hdd-b04df66fe9" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1657281600">-</changelog>
  </package>
  <package pkgid="1b38fff90f56ab69e6b6dff94dfb7cd3059532650c7f156e993b0ad8b83b1c50" name="firmware-hdd-b1c9eaf74c" arch="x86_64">
    <version epoch="0" ver="HPDA" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1647864000">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1666180800">-      Firmware adds support for new humidity sensor</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1670932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1671019200">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1674302400">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
  </package>
  <package pkgid="6f8e3d3032ab64d15533181fcca881bf08883cd54b80883a7e167f873715ee85" name="firmware-hdd-b45e49679c" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-3.1" date="1572955200">-      Fixed timing issue to pass VMWare VSAN certification.  Downgrading to any previous version of firmware is not allowed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-4.1" date="1598270400">-      Added support for RHEL8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-9.1" date="1670932800">-</changelog>
  </package>
  <package pkgid="b4b6a4c1da8753a41d627787b7762080816c3b8d213779c44b76d0ec543291da" name="firmware-hdd-b460823f70" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611835200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1611921600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="a2a4b2d0595668e78ab9bb45fcd3b13d1058481da2cffb6756d14956dd1d5b88" name="firmware-hdd-b78255e146" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1666180800">-      Fix for potential hangs and timeouts, tuning fixes based on field experience and maintenance logging items</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1671019200">-      Fix for potential hangs and timeouts, tuning fixes based on field experience and maintenance logging items</changelog>
  </package>
  <package pkgid="ebde8b9e45fed11b2589c8f3ea7e8bf9707596f4812fbe2909e4ba31daad58aa" name="firmware-hdd-b85516c7d2" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="99f71236499a081e3b665c036209639a7ce0d62478e9a9af37a4bad37304d64f" name="firmware-hdd-b8a60fbe9a" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="4228b3867ec30f9d1bd3ae0928f24f25ec7b04e03555ac269307a9186877cf31" name="firmware-hdd-b9340d29be" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-12.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="30c20deaa495a52a5090c2d287b813f28fa302c97e4f033f65bfe6b6a4affd3c" name="firmware-hdd-bdfb8e99d9" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1647777600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1647864000">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666180800">-      Firmware adds support for new humidity sensor</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1670673600">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
  </package>
  <package pkgid="95e635ac9ad5aaa437e305e648cfd37c1e2fa6d9b7c0f665f78624e304adf485" name="firmware-hdd-befd42bd64" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1644148800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1644235200">-      Support new PCB H/W with new temperature sensor.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1680436800">-      Improve the FW about data mismatch after SPL</changelog>
  </package>
  <package pkgid="2f9e1354c8e444c7258e2c8f7ce6dc916fe3afbb425c7fcd25395bd32d943725" name="firmware-hdd-bfc4af697b" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="39b51cac22cfc1e4c297ad6228f42ed8216b6e64a1f88b59a31253d1ac7caacc" name="firmware-hdd-c4355d15c4" arch="x86_64">
    <version epoch="0" ver="4ICSHPK4" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-2.1" date="1621857600">-      Fixed HPK3 drive reports incorrect Device ID issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-3.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-4.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-6.1" date="1680177600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-7.1" date="1689249600">-</changelog>
  </package>
  <package pkgid="8d2fa97b0caf8ff2692e584aab8a39945089d6947e29c2a1799fd1d29d6981c0" name="firmware-hdd-c566d63ca0" arch="x86_64">
    <version epoch="0" ver="HPG7" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7" date="1681992000">-      Fixes a false indication of rare capacitor test failure</changelog>
  </package>
  <package pkgid="4755748ea21ae2feb8bb1761f043a8c5f1be06b3df8cca840d3ecb8f123fef39" name="firmware-hdd-c5cd837c29" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1616932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1617019200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1657108800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1657195200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1657281600">-</changelog>
  </package>
  <package pkgid="1ea15764a1676a3156bf27c2bfd8cd8041470c56185ca6a0c06e4d8c7bdcad93" name="firmware-hdd-c7df7ceedb" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1628078400">-     This firmware fixes a condition that could cause the heads to land on the
    media in an emergency power off situation, and another condition that can lead
    to high-fly write, and eliminates a command timeout issue. Some internal
    logging operations were refined at the same time.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664366400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664452800">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1671105600">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
  </package>
  <package pkgid="197e6973057b38ffc919eac28ff21da9965e9c9c04e5fd1135832db72a95b13e" name="firmware-hdd-c993b31232" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661428800">-      Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1666008000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1666094400">-      Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer - Improve random mix performance in TL=2048k and 512k</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1671105600">-      Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer - Improve random mix performance in TL=2048k and 512k</changelog>
  </package>
  <package pkgid="8d9872ab0b174edb459b1d073afa8c6922969934dada4581063646393d5ef9bd" name="firmware-hdd-ca21e169e2" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="e0f161a1a642544ce43c8fd88e17bacba33817f0e41cee3300f11c34a6eee306" name="firmware-hdd-cc819d4bff" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1614772800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1632484800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1652702400">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-9.1" date="1657108800">-</changelog>
  </package>
  <package pkgid="748dc1d12dd08d5fb7b9171d629912a4294ec702f5943c6065dd3c6edae92897" name="firmware-hdd-cea219e4b1" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1567598400">-      Fixes an issue where the SSID was not programmed correctly to the drive. This may cause issues with the drive not being identified correctly in the Integrated Lights Out Utility.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1598270400">-      Added support for RHEL8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1614168000">-      Fixed SSD weargauge report error issue.
      * Fixed Assign FWState as TR_DONE_ERR at the correct location.
      * Prepare proper response data for Get Message Type Supported MCTP Command.
      * Added code to preserve current feature values cross live firmware update.
      * Allocate 4 bytes instead of 2 bytes for parameter code.
      * Changed the value for NLB equal to NSize -1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1670932800">-</changelog>
  </package>
  <package pkgid="34c8d603ab2220ac19b1a2843d552c8291897d57ba9e21d8ddf89c4808697b30" name="firmware-hdd-cf0b6cabe1" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1626350400">-     This firmware version updates the Vendor ID in the standard inquiry to 'HPE',
    in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1664366400">-      Addresses a hot plug reporting concern
      * Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1671105600">-      Addresses a hot plug reporting concern
      * Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration</changelog>
  </package>
  <package pkgid="606881be4429cce7e5b22bd583995fd051212411c3a562f6a881b58a71ef68fd" name="firmware-hdd-cfd7436fcc" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1623758400">-      VENDOR IDENTIFICATION field change from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="5dd469571354b3da132e4ce41f883a5cc833d14a170546ba9fa33b5c0619514d" name="firmware-hdd-d1cf327bc4" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1611835200">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1611921600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="0c6d5d005422e179d2a06605b3dbcddd238c6583053f16fd81884e6af89c9036" name="firmware-hdd-d39e7a7e75" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="ba0401ac4ae4ef78c853379793bc53ea3cb05481559cf4a2b6292b3bd64b02ee" name="firmware-hdd-d4be2aecbb" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1657281600">-</changelog>
  </package>
  <package pkgid="8b71a8ab035f5c2ce836daa058e4634ac8f2a8ad84f0076a4d143a65c5bd6663" name="firmware-hdd-d550523365" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1632484800">-      VENDOR IDENTIFICATION field changed from "HP" to "HPE" and Reliability improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="53dbc9601a8b85958ab3773fcecd91c9971b74932e25d011a76f174aad7015c0" name="firmware-hdd-d7af557f47" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617883200">-      This firmware provides a change to the Vendor ID in the VPD page that refers to HP instead of HPE.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="864be01dd980fda0b360de567ade0a887c44bdd846dcd7a466eced8d1d419b7e" name="firmware-hdd-db687966b4" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="548760fa203f43a14eec2015866955fc2f028b5869dd9b67f8fd53488ccaaaa7" name="firmware-hdd-e0171a2936" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1683115200">-      Improves data integrity
      * Decreases possibility of data corruption in certain error and timing conditions
      * Reduces the probability of hangs and provide a minor performance improvement</changelog>
  </package>
  <package pkgid="66d6d1f375aca66901104caac380b6befd9560d68122bb1f5ec4bea083427683" name="firmware-hdd-e320db791d" arch="x86_64">
    <version epoch="0" ver="MPK76H5Q" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-4.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-4.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-4.1" date="1652702400">-      Fixed False UECC issue at idle power mode (12.8TB and 15.36TB only).
      * Apply PCLK running PHY option, PLL clock disable can be avoided in lane 0 missing case.
      * Old FW download Blocking.
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q" date="1652961600">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-2.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-2.1" date="1661428800">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-4.1" date="1681300800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-4.1" date="1681387200">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-5.1" date="1689076800">-</changelog>
  </package>
  <package pkgid="7446c6da932436b6c2f0074a95e8412f098016d141b3abd83199d1c34b5e86b3" name="firmware-hdd-e4f147cdd2" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1629115200">-     This firmware revision corrects a rare situation where a Cryptographic Erase
    could result in random data instead of the expected deterministic zeros. This
    is judged as low severity because it does not compromise user data or
    security, but justifies the update to preclude potential security concerns.
    There are several items that reduce the probability of hangs and provide some
    minor performance improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1671105600">-      This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.
      * The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.
      * Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</changelog>
  </package>
  <package pkgid="a2d8f708067844b11c447c01c0028645623b5b7f79dcea9121e806182ef4dbb8" name="firmware-hdd-e800e8d3b9" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1671019200">-</changelog>
  </package>
  <package pkgid="6a5483ba7255350fa601df50b31460c1361b63756728fcd8d9477313ccef41f3" name="firmware-hdd-ec908c3650" arch="x86_64">
    <version epoch="0" ver="HPG9" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1572955200">-      Added support for RHEL8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1598184000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG9" date="1655380800">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up</changelog>
  </package>
  <package pkgid="88473c3ee43ece606a67fa3e9402c774ce1c6dc968b131dbc3e884fd003e459f" name="firmware-hdd-edf6dcd906" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614686400">-      Online firmware flashing of drives attached to aSmart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiantand Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like(B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="fbe39fddd85e16c6431f283c5fb51c82e872db6c536003ffeabce93fe21c6118" name="firmware-hdd-f0c91d2fe3" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1616932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617019200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657108800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657195200">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1657281600">-</changelog>
  </package>
  <package pkgid="55d130205319c005626581d7a82a784753dd1236d266c458a96c383383e531fe" name="firmware-hdd-f3faa195ff" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1614600000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1614686400">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1614772800">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1632484800">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1652702400">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-10.1" date="1657108800">-</changelog>
  </package>
  <package pkgid="d3db04e2a9d9c74be9427a1efbd5f9d3d6f0ad3f638e0fbe0197721a790876f5" name="firmware-hdd-f42438de3d" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="dfd6e91514a8653de39914d92f572390a4f6e80e171a0bf0540e1c416fc3b7a9" name="firmware-hdd-f693ccc138" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1671105600">-</changelog>
  </package>
  <package pkgid="6671e118289a9d32292ab059a150072ccdf5f3c12cadace16dba5d8e64d92f2e" name="firmware-hdd-f6d00bd17e" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1616328000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1616414400">-      There is no compelling reason to update this firmware. Risk is that whoever looks at the Vendor ID in the VPD page will notice that it refers to HP instead of HPE. There is no functional risk if not upgraded.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657195200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1657281600">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1657368000">-</changelog>
  </package>
  <package pkgid="0655bdaff0fadec178a4cc42a34f85d42437c4418716c362b8d2d4f166db8437" name="firmware-hdd-fa46c607d6" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1622635200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1622721600">-      This firmware version updates the Vendor ID in the standard inquiry to 'HPE', in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1654862400">-      Firmware addresses a hot plug reporting concern</changelog>
  </package>
  <package pkgid="aa2993889038bb33ce50a28763b660ff5ba22c453056ff5fbea39adcdd78fe22" name="firmware-hdd-faf39e0ff7" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1614772800">-      This firmware release provides additional protections against hangs in certain corner cases, and cleans up some error handling and command behavior issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1627992000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1628078400">-     This firmware release provides additional protection against command timeouts.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629806400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629892800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629979200">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1657195200">-</changelog>
  </package>
  <package pkgid="b50eac2128ebf2b2387a5c14a8885770ad7aed6db7b9098d34257904cfda13ac" name="firmware-hdd-fe9c474847" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1567598400">-      Fixes an issue where the SSID was not programmed correctly to the drive. This may cause issues with the drive not being identified correctly in the Integrated Lights Out Utility.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1614772800">-      Fixed SSD weargauge report error issue.
      * Fixed Assign FWState as TR_DONE_ERR at the correct location.
      * Prepare proper response data for Get Message Type Supported MCTP Command.
      * Added code to preserve current feature values cross live firmware update.
      * Allocate 4 bytes instead of 2 bytes for parameter code.
      * Changed the value for NLB equal to NSize -1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1670932800">-</changelog>
  </package>
  <package pkgid="84646ce1c77db00ef8d88d05e361beb92bcc80bcd8c590a63236bd5285c572a7" name="firmware-iegen10" arch="x86_64">
    <version epoch="0" ver="0.2.3.0" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.6.1" date="1525780800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    System ROM V1.26 or later
    
    **Problems Fixed:**
    
    Addressed an issue where the Integrated Lights-Out (iLO) web interface may
    incorrectly report the Innovation Engine is running in a degraded state.
    
    Addressed an issue where memory telemetry data may not be reported properly in
    the Integrated Lights-Out (iLO) web interface or through the HPE RESTful API.
    
    Addressed an issue where the Innovation Engine Firmware flash would fail if a
    previous flash attempt was interrupted and not completed successfully.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.6.1-3.1" date="1544184000">-     *Important Notes:**
    
    Ver. 0.1.6.1(C) contains updates to the component packaging and is
    functionally equivalent to ver. 0.1.6.1.  It is not necessary to upgrade with
    Revision C if a previous component Revision was used to upgrade the firmware
    to version 0.1.6.1.
    
    **Firmware Dependencies:**
    
    System ROM V1.26 or later  
    
    **Problems Fixed:**
    
    Addressed an issue where the Integrated Lights-Out (iLO) web interface may
    incorrectly report the Innovation Engine is running in a degraded state.
    
    Addressed an issue where memory telemetry data may not be reported properly in
    the Integrated Lights-Out (iLO) web interface or through the HPE RESTful API.
    
    Addressed an issue where the Innovation Engine Firmware flash would fail if a
    previous flash attempt was interrupted and not completed successfully.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.0.11" date="1550059200">-     Added support for Intel Xeon Scalable Performance 3200, 4200, 5200, 6200 and
    8200 series processors.
    
    Added support for HPE system performance monitoring and workload performance
    advisor. This feature also requires Integrated Lights-Out (iLO) firmware
    version 1.40 or later.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.0.11" date="1550145600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where updates to the Intel Server Platform
    Services (SPS) firmware may fail.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.1.2-2.1" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for HPE Persistent Memory featuring Intel Optane DC Persistent
    Memory.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.0" date="1585742400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where Processor or Memory temperature
    reporting may not be collected properly by the platform and the system fans
    may be running faster than expected. This issue has been seen occasionally
    after a server reboot and is typically corrected with a subsequent server
    reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.2" date="1623153600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where processor or memory temperature
    reporting may stop reporting properly or report a constant reading after
    servers have been operating over an extended period of time without an AC
    power cycle.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.3" date="1630065600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Address an issue where Innovation Engine (IE) Firmware may be unresponsive and
    iLO Firmware may report "Update Failed" after flashing the Innovation Engine
    (IE) Firmware via RESTful update.  The flash will have been performed
    successfully, but the system must be reset for IE Firmware to function
    properly.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.3.0" date="1645704000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours. On some systems this could result in a brief drop in CPU utilization or
    network traffic lasting less than a second.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.3.0-3.1" date="1660478400">-     *Important Notes:**
    
    Ver. 0.2.3.0(C) contains updates to the firmware packaging and is functionally
    equivalent to ver. 0.2.3.0. It is not necessary to upgrade with Revision B if
    a previous component revision was used to upgrade the firmware to version
    0.2.3.0.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours. On some systems this could result in a brief drop in CPU utilization or
    network traffic lasting less than a second.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="f56700d09d7e87f7c858d21a39a7f536b3d59a860857f89c2a58f525324a6cd0" name="firmware-iegen10plus" arch="x86_64">
    <version epoch="0" ver="1.0.0.22" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0.20" date="1623326400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0.22" date="1648641600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0.22-3.1" date="1660478400">-     *Important Notes:**
    
    Ver. 1.0.0.22(C) contains updates to the firmware packaging and is
    functionally equivalent to ver. 1.0.0.22. It is not necessary to upgrade with
    Revision B if a previous component revision was used to upgrade the firmware
    to version 1.0.0.22.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="7ac0a2ea537784e4f860851f54eeebac4b291e54308a53a8d286e6a8573b6edc" name="firmware-ilo5" arch="x86_64">
    <version epoch="0" ver="2.96" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.81" date="1680091200">-     None.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.81" date="1680177600">-      Not clearing error in processing interrupts can lead to interrupt storms leading to firmware watchdog reset 
      * RDE Changes to create Location URI for newly created resource when LRT is completed
      * RDE client MC error code mapping is wrong
      * iLO FW Communication Issue 1) iLO cannot be accessed via Web UI AND/OR 2) Ilorest commands slow/unresponsive post upgrade to iLO version 2.78
      * Server fails to power up as secure start did not complete successfully</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90" date="1684324800">-       Handle Devices reconnection when Bus Device Function information has changed after the Device comes back after Reset. 
      *  Enhancements to ensure Simplified Compute Ops Management onboarding. 
      *  Logging Improvements in Compute Ops Management.
      *  Implemented a flag that allows autoconnection to Compute Ops Management after reboot.
      *  Handle Type - A Firmware Update gracefully even when iLO goes for a reboot. 
      *  Handle Reset scenarios gracefully when updating via Compute Ops Management instead of abruptly going for a reset component gets updated.
      *  Enable/disable SNMP v1 and v3 independently</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90" date="1684411200">-        UEFI iLO config utility lets users add special characters to the ILO hostname
      *   Over Temperature alerts observed with Pensando Cards.
      *   CEC FW Version not seen on iLO 5.
      *   Discrepancy observed in the Current Operating Power comsumption data
      *   Incorrect CPU throttling information observed in iLO.
      *   Incorrect HPE DIMM part number in ERS memory Event.
      *   iLO incorrectly reports missing PSUs and sensor readings.
      *   iLO incorrectly shows connected to Compute Ops Management though connection is not established.
      *   System shuts down when updating Intelligent Provisioning and SPP.
      *   Issues observed on iLO with DL360 Gen10 Server and NVMe SSD Boot drives combination.
      *   Thermal policy is not spinning up fans in some cases resulting in inadequate air flow.
      *   Local User Passwords containing a backslash character may not be set correctly in the iLO 5 Command Line Interface
      *   Organizational Unit attribute is mandatory for the iLO Redfish REST API for generating a CSR whereas in the UI it is marked Optional.
      *   Automatic Certificate Enrollment may not work if the Certificate Authority signing the iLO Certificate Signing Request is an Intermediate.
      *   SPP/SUM Nutanix DX380 (Gen10): Intermittent Issue Updating IE and SPS FW from SPP2022.03.0 - Duplicate of "Intelligent Provisioning and Manageability Engine Firmware fails to get updated intermittently."
      *   "Trap Source Identifier" setting periodically changes to "iLO Hostname" from previously defined "OS Hostname"
      *   IE not updating due to incorrect Target GUID
      *   Caution Threshold and Critical Threshold reported on Memory Temperature sensor of NVIDIA A100-SXM4-80GB</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.91" date="1684756800">-     iLO 5 v2.91 has the same content or feature set as iLO 5 v2.90 plus an
    additional fix for COM (Compute Ops Management) related to COM4VC bundle
    update message and event. The additional COM related fix is NOT applicable to
    other regular use case scenarios. Hence upgrading to iLO 5 v2.91 is optional.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.91" date="1684843200">-     N/A</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.91" date="1684929600">-     Fix provided to have synchronous messages to reflect the status, to Compute
    Ops Management, after completion of server reset during bundle update in
    COM4VC use case scenario.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.95" date="1689854400">-     \- Added capability in iLO for Two Factor Authentication using OTP (One Time
    Password) for Microsoft AD users  
     \- To display drive enclosure info in Firmware tab in iLO  
     \- Support for controller which goes for functional reset runtime  
     \- iLO to mark the correct component update status for runtime agent
    updatable components based on the update status and update result  
     \- Secure erase of data based on the usecase (customer, factory or openbmc
    ownership transfer)  
     \- iLO stops the bundle update in the scenario where BootToUefi task goes to
    exception to ensure Graceful shutdown of server  
     \- iLO Support for OBSE in factory mode without the need for Advance License  
     \- Added support for comma (",") as a delimiter for multiple email IDs in
    AlertMail feature</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.95" date="1689940800">-     \- OEM iLO component does not show the OEM equivalent entry for Intelligent
    Provision in One Time Boot Option  
    \- Handling delayed device discovered in UEFI mode during discovery phase  
    \- Persist the KCS interface setting across iLO reboots  
    \- Capability to enable KCS interface setting without needing a factory reset</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.96" date="1692619200">-     Initial Build</changelog>
  </package>
  <package pkgid="2b31a0cac8173168d2aa7d28fa8424fac7dfd412934aac42294c0099229fae43" name="firmware-microservergen10plussps" arch="x86_64">
    <version epoch="0" ver="05.01.04.913" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.113" date="1591617600">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for a variety of security vulnerabilities. The
    following vulnerabilities have been addressed in this SPS release:
    CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.208" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623067200">-     See the release document in Download Product Binaries page from Product
    Summary of the firmware product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2020-24509.
    These security vulnerabilities are documented in Intel Security Advisory
    INTEL-SA-00459.  These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.400" date="1644321600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2021-0060. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.500" date="1652184000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.600" date="1660046400">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.2 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.700" date="1667908800">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.804" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.913" date="1689249600">-</changelog>
  </package>
  <package pkgid="07ab5b8912594ee4697992c5740a6673d030b5473b1cef77b9ddf8c751a3437d" name="firmware-microserverv2gen10plus_me" arch="x86_64">
    <version epoch="0" ver="06.00.03.505" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.200" date="1663329600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.204" date="1667908800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version is in compliance with Intel IPU.2022.3 guidance.
    
    The following vulnerabilities have been addressed in this SPS release:
    CVE-2022-29515. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676289600">-     This version is in compliance with IPU.2023.1 guidance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2022-36794. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.505" date="1688040000">-</changelog>
  </package>
  <package pkgid="8cbf542eb0ac32644cefb1522394ffbfccc34059391c024f866cb34a0e787a6e" name="firmware-ml30gen10plus_me" arch="x86_64">
    <version epoch="0" ver="06.00.03.505" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.035" date="1646568000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.039" date="1646654400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the System ROM contains updates aligned with the Tatlow PLR2
    BKC WW50.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.200" date="1653566400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the MCTP PCIe devices could not be discovered after
    an SPS firmware update without an AC power cycle. This issue is not unique to
    HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.204" date="1667908800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version is in compliance with Intel IPU.2022.3 guidance.
    
    The following vulnerabilities have been addressed in this SPS release:
    CVE-2022-29515. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676289600">-     This version is in compliance with IPU.2023.1 guidance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2022-36794. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.505" date="1688040000">-</changelog>
  </package>
  <package pkgid="baf79196bcd1eeeeb72ca3db237e02af0650628f02e267a51f7949b4b54eb38c" name="firmware-nic-bcm" arch="x86_64">
    <version epoch="0" ver="2.34.1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.34.1" date="1688817600">-      This product addressed the disconnection with iLO after switching to Shared Network mode.
      * This product addressed the compatibility of shared memory communication on adapter.</changelog>
  </package>
  <package pkgid="f100862c5576bef074715cd512ab3c9435c08c05276b8b6f082a66330b563d05" name="firmware-nic-bcm-nxe" arch="x86_64">
    <version epoch="0" ver="1.17.2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.3" date="1635508800">-     This product addresses an issue where network interface could not be brought
    up under OS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.12.1" date="1646395200">-      This product addresses an issue a packet missing problem after some amounts of multicast UDP streams transmitted.
      * This product addresses an issue the port identifier LED problem on HPE Ethernet 10Gb 2-port 535T Adapter .</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.13.0" date="1661774400">-     This product no longer supported of updating FW via Service Pack for Proliant
    on HPE Proliant Gen9 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.13.50" date="1664625600">-     This product addresses an issue about battery POST error caused by unnecessary
    protocol on Supported Devices of this product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.14.0" date="1670587200">-      This product addresses an issue incorrect reporting on link status of HPE 631FLR-SFP28 Adapter.
      * This product addresses an issue battery POST error caused by unnecessary protocol on Supported Devices of this product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.15.2" date="1680782400">-      This product enhances bnxtnvm support OTP programming.
      * This product enhances coredump support to dump  cache contents.
      * This product enhances Firmware command line module modularity
      * This product enhances to add support for disabling Overflow detection for CQs (Completion Queues) of RoCE (RDMA over converged Ethernet )
      * This product enhances FW support for QUIC key (Quick UDP Internet Connection) context backing store management
      * This product enhances to add support for PCIe TPH (TLP Processing Hints)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.15.2" date="1680868800">-      This product correct an issue which not allow the user to configure the multi-function mode option with option value string.
      * This product correct an issue which the performance issue is seen with GRO offload (Generic Receive Offload) enable.
      * This product correct an issue which the Firmware upgrade fails if bnxtnvm uses the default value.  increased the timeout value to sufficient vaule.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.16.2" date="1686744000">-      This product enhances the RDE BEJ encoding for some MessageArgs.
      * This product removes CCM(Comprehensive Configuration Management) for the legacy driver.
      * This product removes Energy-Efficient Ethernet (EEE) from the PHY.
      * This product adds range validation checks to dest_port and dest_port_mask for ntuple commands.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.16.2" date="1686830400">-      This product fixes the issue of incorrect PCIe VF numbers caused by some NCSI queries.
      * This product fixes the RDE error response for certain properties with unsupported input
      * This product fixes the problem of no RDE alert being generated when the link status changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.17.2" date="1686830401">-     TBD</changelog>
  </package>
  <package pkgid="60f53beab53b475e98dbef5227ae98f484537ff1f3c73711c15c050872cbb1b5" name="firmware-nic-bcm-open" arch="x86_64">
    <version epoch="0" ver="2.34.50" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.50" date="1646654400">-     This product adderssed minor adjustment on its UEFI driver structure.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.60" date="1654516800">-     This product now supports the following network adapters:
    
      * Broadcom BCM5719 Ethernet 1Gb 4-port Base-T Adapter for HPE
      * Broadcom BCM5719 Ethernet 1Gb 4-port Base-T OCP3 Adapter for HPE</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.29.2" date="1661774400">-     This product addresses some minor adjustment with its internal UEFI code
    structure.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.31.0" date="1670587200">-     This product addresses an issue the adjustment of firmware read-write commands
    on corresponding OS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32.3" date="1680782400">-     This product enhances the FW Library to support the second NVRAM type.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32.3" date="1680868800">-     This product correct an issue which the Boot Code Version of the Firmware did
    not get updated after upgrading the Firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.33.3" date="1686744000">-      This product removes CCM(Comprehensive Configuration Management) for the legacy driver.
      * This product adds to support HPE MicroServer Gen11</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.33.3" date="1686830400">-      This product fixes the intermittent issue of displaying incorrect device status under iLO web
      * This product fixes the intermittent lost iLO connection with shared networking mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.34.1" date="1690804800">-      This product addressed a problem where Reboot Required option was not set after doing firmware update under RBSU.
      * This product addressed the disconnection with iLO after switching to Shared Network mode on BCM5719 OCP3 adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.34.50" date="1693656000">-     This product addresses an issue where the FAN behavior with installed BCM 5719
    1Gb 4p BASE-T OCP Adptr.</changelog>
  </package>
  <package pkgid="780a7b680b622b0f360eebc1999a74af3ff5f272655976b869cb24a629b6cd99" name="firmware-nic-cornelis-opa-hfi" arch="x86_64">
    <version epoch="0" ver="1.12.0" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.1" date="1552305600">-     *Changes and New Features in version 1.8.1.0.0 :**
    
      * Added hfi1_eprom **v10_8_0_0_13.**
      * Loader ROM **HfiPcieGen3Loader_1.8.1.0.0.rom** and driver EFI **HfiPcieGen3_1.8.1.0.0.efi** were added.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.0" date="1634472000">-     *No changes and new features in version 1.11.0**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.0" date="1634558400">-     *Fixes included in version 1.11.0:**
    
      * **The following issue has been fixed in Unified Extensible Firmware Interafce (UEFI) ROM: **On some platforms, the hfi1 device was not showing up in BIOS/UEFI boot menus and was not available as a PXE boot device. This was caused by the platform not loading the UEFI driver for the hfi1 adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.12.0-2.1" date="1666180800">-     *Fixes included in version 1.12.0:**
    
      * Fixed race condition between BIOS checking link status and LNI completing which resulted in PXE boot failures.
      * Changed the default behavior of the hfi1_eprom tool to convert the eprom format to version 2, eliminating the need to supply the -N command line argument.
      * Addressed an issue where updating the HfiPcieGen3Loader*.rom file could result in the erasure of HfiPcieGen3Loader*.efi and HFI_TYPE1*.dat files.</changelog>
  </package>
  <package pkgid="d07d182157c5484771ea9688aebdc5951ed825091adc32aa1a090ad3081a0c79" name="firmware-nic-intel" arch="x86_64">
    <version epoch="0" ver="1.28.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.6" date="1631793600">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.50" date="1639137600">-      This product addresses an issue where link flipping is seen with HPE Ethernet 10Gb 2-port 568FLR-MMSFP+ Adapter.
      * This product addresses an issue where the link speed isn't consistent with HPE Ethernet 10Gb 2-port 568FLR-MMT Adapter when system shutdown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.0" date="1643112000">-     This product now supports Red Hat Enterprise Linux 8 update 5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.0" date="1643198400">-      This product addresses an issue where SR-IOV high latency is seen with HPE Ethernet 10Gb 2-port 562SFP+ Adapter and HPE Ethernet 10Gb 2-port 562FLR-SFP+ Adapter.
      * This product addresses an issue where it fails to disable HP Ethernet 1Gb 2-port 361i Adapter in RBSU.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.20" date="1643284800">-     This product now supports Red Hat Enterprise Linux 8 update 5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.35" date="1657886400">-     This product addresses a issue where IGMP2 packets isn't forwarded to the host
    OS when shared NIC is enabled with HPE Ethernet 1Gb 2-port 361i Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24.3" date="1661342400">-     This product addresses a issue where Firmware version isn't displaed in NIC
    HII menu</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27.0" date="1679400000">-      This product addresses an issue where Option ROM version is missing with some Intel 1GB adapters
      * This product addresses an issue where disconnection occurs after rebooting system with HPE Ethernet 1Gb 2-port 368i Adapter and HPE Ethernet 1Gb 4-port 369i Adapter</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27.30" date="1679486400">-     This product addresses an issue where NIC status(iLO page-&gt;System
    Information-&gt;Network) for HPE Ethernet 10Gb 2-port 562SFP+/562FLR-SFP+ Adapter
    is Unknown with being plugged in to a network.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.28.0" date="1684411200">-     This product addresses an issue where the firmware installation exceeds the
    expected time by using Oneview to update Firmware with 568FLR-MMSFP+.</changelog>
  </package>
  <package pkgid="292d9c147863e307fd48549ac38823224d23793e503448ae02c7bcbab478f448" name="firmware-nic-is-intel" arch="x86_64">
    <version epoch="0" ver="1.28.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.55" date="1631707200">-     This product addresses an link issue for Intel X710-DA2 Ethernet 10Gb 2-port
    SFP+ OCP3 Adapter for HPE.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.5" date="1631793600">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.50" date="1639137600">-      This product addresses an issue where the incorrect translation is seen with Intel Intel I350-T4 Ethernet 1Gb 4-port BASE-T  Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24.4" date="1661342400">-     This product now supports HPE ProLiant MicroServer Gen10 Plus v2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.25.4" date="1665489600">-     This product now supports HPE ProLiant Gen11 servers</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.25.4" date="1665576000">-     This product addresses an issue where the adaters isn't recongized with HPE
    Ethernet 10Gb 2-port SFP+ OCP3 X710-DA2  Adapter and HPE Ethernet 10Gb 2-port
    SFP+ X710-DA2 Adapter</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26.0" date="1670241600">-     This product now supports HPE ProLiant Gen11 Platforms with Intel processors</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27.0" date="1679400000">-     This product enhanced the compatibility with i350 and i40ea driver</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27.30" date="1679486400">-     TBD</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.28.0" date="1684411200">-</changelog>
  </package>
  <package pkgid="35881b4bb1e0b64dc1acb63d5a364d35cc74edec8929a276f2971e55d85c64e1" name="firmware-nic-mellanox-eth-only-mft" arch="x86_64">
    <version epoch="0" ver="1.0.6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.1" date="1572955200">-     *Fixes in version** **14.26.XXXX :**
    
      * Fixed an issue that caused a function to misbehave when a PCIe Transaction Layer Packet (TLP) was set with a poisoned indication.
      * Fixed a rare issue that resulted in "destroy mkey " command getting stuck when rebooting the hypervisor.
      * The total firmware reset time is increased by 1 second.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1601899200">-     *Firmware for the following device is updated to 14.27.4000:**
    
    P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **Following New features and Changes are included in version 14.27.4000:**
    
      * Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN 
        * PCI CAP
        * AUTO_POWER_SAVE_LINK_DOWN
      * Added the following segments, as appeared in the PRM, to the Resource Dump: 
        * PRM_QUERY_QP
        * PRM_QUERY_CQ
        * PRM_QUERY_MKEY
        * QUERY_VNIC_ENV</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1601985600">-     *Following issues have been fixed in version 14.27.4000:**
    
      * An issue that caused the sent packet to hang while the device entered FLR mode.
      * Enabled Bar configuration bytewise by applying the write_en bitmask.
      * A rare case where the the device froze while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance while using the VSC to trigger the send_ring_doorbells.
      * An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.
      * An issue that caused the fragmented IP packets to drop was fixed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1614254400">-     *Firmware for the following device is updated to 14.28.1002:**
    
    P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **Following New features and Changes are included in version 14.28.1002:**
    
      * Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN 
        * PCI CAP
        * AUTO_POWER_SAVE_LINK_DOWN
      * Added the following segments, as appeared in the PRM, to the Resource Dump: 
        * PRM_QUERY_QP
        * PRM_QUERY_CQ
        * PRM_QUERY_MKEY
        * QUERY_VNIC_ENV</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1614340800">-     *Following issues have been fixed in version 14.29.1016:**
    
      * An issue that caused the sent packet to hang while the device entered FLR mode.
      * Enabled Bar configuration bytewise by applying the write_en bitmask.
      * A rare case where the the device froze while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance while using the VSC to trigger the send_ring_doorbells.
      * An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.
      * An issue that caused the fragmented IP packets to drop was fixed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632657600">-     *Firmware for the following device is updated to 14.31.1014:**
    
      * P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **New features and changes included in version 14.31.1014:**
    
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632744000">-     *Following issues have been fixed in version 14.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1014:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1647777600">-     *Firmware for the following device has been updated to 14.32.1010:**
    
      * P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1647864000">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6-2.1" date="1658404800">-     *The following changes have been made in sub-version 1.0.6(A):**
    
      * Product rebuilt to have the new SHA 384 signature.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</changelog>
  </package>
  <package pkgid="b9f8c5b6a096dc7e746dec716edb2eb8b37c5f4cbeb6fecf88ab14dd9df7e116" name="firmware-nic-mellanox-ethernet-only" arch="x86_64">
    <version epoch="0" ver="1.0.20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15-2.1" date="1639396800">-     *Fixes included in  firmware version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1200:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.
    
    **The following issues have been fixed in version 16.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.16" date="1647777600">-     *Firmware for the following devices has been updated to 2.42.5044 :**
    
      * 779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)
      * 779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices has been updated to 14.32.1010:**
    
      * 817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
      * 817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device has been updated to 16.32.1010:**
    
      * 874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.32.1010:**
    
      * Added a new NvConfig parameter LOG_MAX_QUEUE to set the maximum number of work queue resources (QP, RQ, SQ...) that can be created per function. The default value is 2^17.
      * Blocked the VF's ability to use both padding and signature in order to prevent the NIC from getting into an unresponsive state.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its rate limit.
      * Performance improvements in the DCT with AR flow by exposing a hint to the software in DCI software context that indicates that RDMA WRITE on this DCI is not supported.
      * Added support for QSHR access register to enable Set and Query rate limit perhost per-port.
      * The firmware now exposes a new Software Steering ICM resource for VXLAN encap expand in order for the SW Steering to manage this resource directly.
      * Enabled the exposure of new ICM resource to the software steering for VXLAN encapsulation expansion.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for DSFP AOC (CMIS) v4 when error code is not reported by the module.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.16" date="1647864000">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.17" date="1663156800">-     *Firmware for the following devices has been updated to 2.42.5044 :**
    
      * 779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)
      * 779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices has been updated to 14.32.1010:**
    
      * 817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
      * 817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device has been updated to 16.33.1048:**
    
      * 874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.17" date="1663243200">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.33.1048:**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.18" date="1670155200">-     *Firmware for the following devices has been updated to 2.42.5044 :**
    
      * 779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)
      * 779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices has been updated to 14.32.1010:**
    
      * 817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
      * 817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device has been updated to 16.34.1002:**
    
      * 874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.34.1002:**
    
      * Added LLDPEnable, LLDPTransmit and LLDPReceive properties to the RDE Port schema implementation.
      * Added "Command Unsupported" response code in cases when running the MCTP control command "Get Vendor Defined Messages Supported", and there were no supported VDMs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.18" date="1670241600">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.34.1002:**
    
      * An issue where set_flow_table_entry failed when aso_flow_meter action was used.
      * A race condition that occured between the duplicate read and QP commands (2RST, 2ERR and Destroy) in the signature that caused the command to hang.
      * When all traffic applications sharing the same combination of &lt;function, priority, side&gt; were rate limited (for example by congestion control), this limit was enforced on other applications with different combinations of &lt;function, priority, side&gt; under the same VL. For example, requestor flows (RDMA-write) were limited to rate X, however, this rate was also enforced on a QP sending RDMA-read responses. This firmware version prevents rate limit enforcement on traffic applications which should not be limited.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.19" date="1680436800">-     *Firmware for the following devices has been updated to 2.42.5044 :**
    
      * 779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)
      * 779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices has been updated to 14.32.1010:**
    
      * 817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
      * 817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device has been updated to 16.35.1012:**
    
      * 874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.35.1012:**
    
      * Added support for copy modify header steering action to/from the UDP field.
      * Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.
      * QoS priority trust default state can now be changed using the new nvconfig below: 
        * QOS_TRUST_STATE_P1
        * QOS_TRUST_STATE_P2
    
    The values that can be used to set the default state are:
    
      * TRUST_PORT
      * TRUST_PCP
      * TRUST_DSCP
      * TRUST_DSCP_PCP</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.19" date="1680523200">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions. 
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.20" date="1690545600">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
  </package>
  <package pkgid="aec98c6bef4fd4baed6971531576eb7a8dd5db314771eb0593ce3e4dc88acdbb" name="firmware-nic-mellanox-vpi-cx6-mft" arch="x86_64">
    <version epoch="0" ver="1.0.11" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1614340800">-     *The following issues have been fixed in version 20.29.1016:**
    
      * Changed the default value of DCQCN's (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.
      * An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.
      * The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.
      * An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.
      * When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.
      * Low performance occurred after enabling the RoCE Accelerator capability.
      * On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1632657600">-     *Firmware for the following devices are updated to 20.31.1014:**
    
    HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21  
    HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21
    
    **New features and changes included in version 20.31.1014:**
    
      * NIC scheduling feature support has been disabled for non-privileged functions.
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * Updated the NC-SI speed reporting output to support 200GbE speed. Now when running the NC-SI command, the output presents 200GbE speed as well.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Asymmetrical MSIX Configuration: This feature allows the device to be configured with a different number of MSIX vectors per physical PCI functions.To use this feature, please follow these steps: 
        * Clear NUM_PF_MSIX_VALID to disable global symmetrical MSIX configuration.
        * Set PF_NUM_PF_MSIX_VALID to enable asymmetrical per Physical Function MSIX configuration.
        * Configure PF_NUM_PF_MSIX per physical PCI function.
      * RDMA partitioning and RDMA counters in IB mode.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.
      * Enabled UID 0 to create resources with UMEM (User Memory).
      * Receiving and sending native IB packets from/to the software (including all headers) via raw IBL2 QPs.
      * RX RDMA NIC flow table on an IB port. Now the software can steer native IB packets to raw IB receive queues according to the DLID and  the DQPN.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1632744000">-     *The following issues have been fixed in version 20.31.1014:**
    
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to unresponsive state.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
      * In InfiniBand non-virtualization system, due to a corrupted steering root, traffic fails after a warm reboot.  
    
                                                                             
    **Additional Fixes included in version 20.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.            
      * Improved PortXmitWait IB counter accuracy.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1648468800">-     *Firmware for the following devices has been updated to 20.32.1010:**
    
      * HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06251-B21
    
    **New features and changes included in version 20.32.1010:**
    
      * Added support for blocking unwanted GMP classes by dedicated MADs.
      * Added a new NvConfig parameter LOG_MAX_QUEUE to set the maximum number of work queue resources (QP, RQ, SQ...) that can be created per function. The default value is 2^17.
      * Added a Congestion Control Key to all Congestion Control MADs to authenticate that they are originated from a trusted source.
      * Added an SMP firewall to block the option of sending SMPs (MADS sent on QP0 from the Subnet Manager) from unauthorized hosts to prevent fake SMPs from being recognized as the SM.
      * Vendor Specific MADs Class 0x9 is no longer supported by the firmware. If case the firmware detects such MAD, the firmware will return a "NOT SUPPORTED" error to the user.
      * Blocked the VF's ability to use both padding and signature in order to prevent the NIC from getting into an unresponsive state.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its rate limit.
      * Performance improvements in the DCT with AR flow by exposing a hint to the software in DCI software context that indicates that RDMA WRITE on this DCI is not supported.
      * Added support for dynamic timeout mechanism when in InfiniBand mode.
      * Added support for QSHR access register to enable Set and Query rate limit per-host per-port.
      * The firmware now exposes a new Software Steering ICM resource for VXLAN encap expand in order for the SW Steering to manage this resource directly.
      * Added support for asymmetrical VFs per PF. To enable it: PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a none zero value.
      * Added 2 new MAD access registers to enable mlxlink to read/write access registers by LID (to the whole subnet).
      * Enabled the exposure of new ICM resource to the software steering for VXLAN encapsulation expansion.
      * Added support for DSFP AOC (CMIS) v4 when error code is not reported by the module.
      * Limited the external loopback speed according to the used module's capabilities.
      * Modified the Effective BER calculation method. Due to this, the value of the Effective BER will be slightly higher, however the link quality remains the same as prior to this change.
      * This firmware version includes the following PCIe changes: 
        * Fixed the ACS Port Number field in DSPs and ACS Egress Control Vector field in DSPs.
        * Added support for VSC on USP of PCIe Switch.
        * Fixed the mapping of Legacy Interrupts in the PCIe Switch.
        * Fixed MRRS &amp; MPS configurations in DSPs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1648555200">-     *The following issues have been fixed in version 20.32.1010:**
    
      * System could not create more than 128K QPs.
      * Incorrect indication of the PCIe link down in the AER registers on PCIe switch upstream port.
      * Invalid RNR timeout when trying to set it during the rts2rts_qp transition.
      * The flash frequency on boot was lower than expected (under 50Mhz). The issue was fixed by enabling the firmware to increase it on boot2 to normal frequency.
      * A race condition between DC QP flush and DC packets that led to stuck slices in the hardware. To avoid such situation, firmware keeps the TCU drop set until QP flush is done.
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1663156800">-     *Firmware for the following devices has been updated to 20.33.1048:**
    
      * HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21
    
    **New features and changes included in version 20.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation. 
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter. 
      * Crypto features can be in either wrapped or unwrapped mode. Meaning, the key can be wrapped or in plaintext when running the CREATE_DEK PRM command. To comply with the requirements specified in FIPS publication, all the created DEKs must be wrapped.  
    This feature adds new NV_CONFIG per device to control this mode, and enables
    the user to change all the crypto features to wrapped or cleartext.
    
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1663243200">-     *The following issues have been fixed in version 20.33.1048:**
    
      * An issue where RDMA write may experience performance degradation when working with Adaptive Routing and DCT half-handshake mode.
      * An issue that ignored the default value of TX_SCHEDULER_BURST when its value in the ini was different than "0".
      * Implemented SLD detection code. Surprise Down Error Reporting Capable value was changed from 1 to 0 in boards where the downstream perst was not controlled thus causing SLD detection not to function properly.
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * RDMA_WRITE traffic performance degradation that occured when working with DC on Adaptive Routing network.
      * Bad cache invalidations of destroyed QPs.
      * A rare case where asserts and ext_synd appeared in dmesg after performing driver restart. 
      * An issue related to host isolation on multi-host systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1680436800">-     *Firmware for the following devices has been updated to 20.35.1012:**
    
      * HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21
    
    **New features and changes included in version 20.35.1012:**
    
      * Added support for copy modify header steering action to/from the UDP field.
      * Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.
      * QoS priority trust default state can now be changed using the new nvconfig below: 
        * QOS_TRUST_STATE_P1
        * QOS_TRUST_STATE_P2
    
    The values that can be used to set the default state are:
    
      * TRUST_PORT
      * TRUST_PCP
      * TRUST_DSCP
      * TRUST_DSCP_PCP
      * Added support for using SetEventReceiver PLDM command with mode polling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1680523200">-     *The following issues have been fixed in version 20.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * The RXT E2E inflight went into an unresponsive state occasionally.
      * RDMA partition was reported even if NIC+RDMA mode was disabled.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * An incorrect address issue for XRQ Event Backend Controller Px Syndrome event in multi-host system during FLR.
      * PCIe SKP OS generation interval issue for Gen1 and Gen2.
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.
      * PLDM AEN event receiver was required to be cleared on PCIe reset in case the media type was MCTP over PCIe VDM.
      * Asynchronous messages were sent over MTCP before endpoint discovery was done.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1689940800">-     *No new fixes have been included in version 20.37.1700**</changelog>
  </package>
  <package pkgid="af9d8090dcd682d58bf2029db706b2cd6d96f84c5516a0942b10ebf70b59414f" name="firmware-nic-open-mellanox-eth-mft" arch="x86_64">
    <version epoch="0" ver="1.0.10" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632744000">-     *The following issues have been fixed in version 14.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1014:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.
    
    
    
    **The following issues have been fixed in version 14.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1200:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.  
    
    
    **The following issues have been fixed in version 16.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1647777600">-     *Firmware for the following devices has been updated to 14.32.1010:**
    
      * P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
      * P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    
    
    **Firmware for the following device has been updated to 16.32.1010:**
    
      * P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.32.1010:**
    
      * Added a new NvConfig parameter LOG_MAX_QUEUE to set the maximum number of work queue resources (QP, RQ, SQ...) that can be created per function. The default value is 2^17.
      * Blocked the VF's ability to use both padding and signature in order to prevent the NIC from getting into an unresponsive state.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its rate limit.
      * Performance improvements in the DCT with AR flow by exposing a hint to the software in DCI software context that indicates that RDMA WRITE on this DCI is not supported.
      * Added support for QSHR access register to enable Set and Query rate limit perhost per-port.
      * The firmware now exposes a new Software Steering ICM resource for VXLAN encap expand in order for the SW Steering to manage this resource directly.
      * Enabled the exposure of new ICM resource to the software steering for VXLAN encapsulation expansion.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for DSFP AOC (CMIS) v4 when error code is not reported by the module.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1647864000">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1663156800">-     *Firmware for the following devices has been updated to 14.32.1010:**
    
      * P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
      * P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    
    
    **Firmware for the following device has been updated to 16.33.1048:**
    
      * P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1663243200">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.33.1048:**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1670155200">-     *Firmware for the following devices has been updated to 14.32.1010:**
    
      * P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
      * P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    
    
    **Firmware for the following device has been updated to 16.34.1002:**
    
      * P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.  
    
    
    **New features and changes included in version 16.34.1002:**
    
      * Added LLDPEnable, LLDPTransmit and LLDPReceive properties to the RDE Port schema implementation.
      * Added "Command Unsupported" response code in cases when running the MCTP control command "Get Vendor Defined Messages Supported", and there were no supported VDMs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1670241600">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.  
    
    
    **The following issues have been fixed in version 16.34.1002:**
    
      * An issue where set_flow_table_entry failed when aso_flow_meter action was used.
      * A race condition that occured between the duplicate read and QP commands (2RST, 2ERR and Destroy) in the signature that caused the command to hang.
      * When all traffic applications sharing the same combination of &lt;function, priority, side&gt; were rate limited (for example by congestion control), this limit was enforced on other applications with different combinations of &lt;function, priority, side&gt; under the same VL. For example, requestor flows (RDMA-write) were limited to rate X, however, this rate was also enforced on a QP sending RDMA-read responses. This firmware version prevents rate limit enforcement on traffic applications which should not be limited.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1680436800">-     *Firmware for the following devices has been updated to 14.32.1010:**
    
      * P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
      * P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    
    
    **Firmware for the following device has been updated to 16.35.1012:**
    
      * P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.  
    
    
    **New features and changes included in version 16.35.1012:**
    
      * Added support for copy modify header steering action to/from the UDP field.
      * Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.
      * QoS priority trust default state can now be changed using the new nvconfig below: 
        * QOS_TRUST_STATE_P1
        * QOS_TRUST_STATE_P2
    
    The values that can be used to set the default state are:
    
      * TRUST_PORT
      * TRUST_PCP
      * TRUST_DSCP
      * TRUST_DSCP_PCP</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1680523200">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.  
    
    
    **The following issues have been fixed in version 16.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions. 
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1690545600">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.  
    
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
  </package>
  <package pkgid="51cf7334d4f6be4d89aef62c83137c008355df37795c4c8f9e0122555de8d4e1" name="firmware-nic-qlogic-flq" arch="x86_64">
    <version epoch="0" ver="1.23.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.7.16" date="1565611200">-     This product corrects an issue where the firmware update fails when the first
    port is disabled on the network adapter.
    
    This product corrects an issue where not all devices are discovered as part of
    firmware update on a multi-root-complex platforms like Integrity, Superdome
    etc.
    
    This product corrects an issue where the system hangs during POST with red
    screen when iSCSI boot LUN is re-exported (after a previous unexport
    operation) from the iSCSI host (HPE 3PAR StoreServ Storage).
    
    This product corrects an issue where 'HPE Synergy 4820C 10/20/25Gb Converged
    Network Adapter' disappears after changing its link speed under its
    configuration menu (located at 'System Utilities'(F9 at POST)-&gt;'System
    Configuration').
    
    This product corrects an issue where the configuration settings of the
    adapter, connected to a server managed by OneView profile, may be reset to
    defaults after a system reboot.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.12" date="1572523200">-     This product now remove supports Synergy and Blade Server.
    
    This product now supports Red Hat Enterprise Linux 8.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.12" date="1572609600">-     This product addresses an issue where 2nd port reports "function type:
    disabled" with HPE Ethernet 10Gb 2-port 524SFP+ Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.9.8" date="1594987200">-      This product corrects the abnormal disconnection of iLO web page while performing under Shared Networking on Flexible-LOM.
      * This product addresses an issue where the HPE Ethernet 10/25Gb 2-port 622FLR-SFP28 adapter and  HPE Ethernet 10/25Gb 2-port 621SFP28 Adapter UMCE (Uncorrectable Machine Check Exception) was followed by Unrecoverable I/O error, Uncorrectable PCI express error on Server and one of the ports suddenly no longer can send or receive traffic.
      * This product addresses an issue where driver doesn't load upon booting up by correct memory relocation.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.10.10" date="1614859200">-     This product contains support PLDM firmware upgrade base improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.0" date="1635508800">-     This product addresses an issue where the modification on string format of
    firmware update payload.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20.1" date="1646395200">-     This product addresses the problem that the MAC being modified after Firmware
    update</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.21.3" date="1661342400">-     This product now supports Red Hat Enterprise Linux 8 Update 6, Liunx 9 and
    SUSE Linux Enterprise Server 15 Service Pack 4.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.0" date="1680868800">-     This product addresses an issue where Max Number of Virtual Machine
    Queues/Physical Function shows zero value in AHS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.0" date="1682683200">-     TBD</changelog>
  </package>
  <package pkgid="0c5343cd8e81159168f8faebf8e094469d8e75cef571feaa5ddc7748b168a124" name="firmware-nic-qlogic-nx2" arch="x86_64">
    <version epoch="0" ver="2.33.1" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.26.30" date="1583236800">-     This product addresses an Overheat issue that system shuts down automatically
    due to NIC temperature exceeding threshold.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.27.8" date="1594987200">-      This product corrects the display problem of the adapter name under RBSU.
      * This products corrects some issues about the thermal reporting and temperature threadshold control of the adapter.
      * This product addresses an issue where unexpected UMCE(Uncorrectable Machine Check Exception) appeared when powering on the system with NPAR(Network Partitioning) enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.27.50" date="1602244800">-     This product addresses an issue where the Firmware installation failure when
    enabling secure boot under SUSE Linux Enterprise Server 15 SP2.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.6" date="1614859200">-     This product addresses an issue that platform would be randomly waked up by
    WOL packet.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.50" date="1627387200">-      **This product addressed the firmware update failure problem which may cause NIC FW corruption.**
      * **This product addressed the firmware update failure problem while the platform secure boot being enabled.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.29.2" date="1631793600">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30.2" date="1646395200">-      This product addresses a cosmetic change in the adapter configuration page to reflect that DCBx is enabled and as long as LLDP is enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.31.4" date="1661342400">-     This product now supports Red Hat Enterprise Linux 8 Update 6, Liunx 9 and
    SUSE Linux Enterprise Server 15 Service Pack 4</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32.0" date="1680868800">-     This product synchronizes FW Upgrade Utilitiy version with VMware and Linux
    drivers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.33.1" date="1682683200">-     TBD</changelog>
  </package>
  <package pkgid="93cab319d65237055e4e48154a45aa92666f63fcc8a0c11118123cb5b01236da" name="firmware-powerpic-gen10" arch="x86_64">
    <version epoch="0" ver="1.1.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.2" date="1496750400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1503489600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-2.1" date="1541419200">-     *Important Notes:**
    
    Ver. 1.0.4 (B) contains support for new server products.  It is functionally
    equivalent to ver. 1.0.4.  It is not necessary to upgrade with Revision (B) if
    a previous component revision was used to upgrade the firmware to ver. 1.0.4.
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-4.1" date="1548936000">-     *Important Notes:**
    
    Ver. 1.0.4 (D) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.4.  It is not necessary to upgrade with Revision (D) if
    a previous component revision was used to upgrade the firmware to ver. 1.0.4.
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1566820800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors. ROM version 2.00 or
    later is required to enable the support. This version of firmware does not
    include any changes for platforms with Intel Processors or AMD EPYC 7001
    Generation Processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7-2.1" date="1583755200">-     *Important Notes:**
    
    Ver. 1.0.7 (B) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (B) if
    a previous component revision was used to upgrade the firmware to ver.
    1.0.7.This is the initial version for HPE Gen10 Plus servers.  
    
    
    **Firmware Dependencies:**
    
    For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is
    required to enable the support. iLO5 version 1.40 or above is required to
    upgrade to this version.
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant
    DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the
    support. This version of firmware does not include any changes for Gen10
    platforms with Intel Processors or AMD EPYC 7001 Generation Processors. iLO5
    version 1.40 or above is required to upgrade to this version.
    
    This is the initial version for HPE Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7-3.1" date="1612958400">-     *Important Notes:**
    
    Ver. 1.0.7 (C) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (C) if
    a previous component revision was used to upgrade the firmware to ver.
    1.0.7.This is the initial version for HPE Gen10 Plus servers.
    
    **Firmware Dependencies:**
    
    For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is
    required to enable the support. iLO5 version 1.40 or above is required to
    upgrade to this version.
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant
    DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the
    support. This version of firmware does not include any changes for Gen10
    platforms with Intel Processors or AMD EPYC 7001 Generation Processors. iLO5
    version 1.40 or above is required to upgrade to this version.
    
    This is the initial version for HPE Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1631707200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Fixed an issue of inaccurate temperature readings when the actual temperature
    exceeds 100 C on Proliant Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1683028800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    For HPE ProLiant Gen10 Plus servers, iLO5 version 2.55 or above is required to
    upgrade to this version.
    
    **Problems Fixed:**
    
    Fixed an issue where the CPU may not restore to original working frequency
    after turning off Power Capping.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.0" date="1691150400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed a rare issue where CPU could become stuck at its lowest working
    frequency when dynamic power capping was enabled on AMD-based systems.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="c40da4d0a71ec565fccfffc9e59049a7014328e199bb176ca6ab82766119bc4e" name="firmware-smartarray-1f19a4a64d" arch="x86_64">
    <version epoch="0" ver="5.15" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.09" date="1622635200">-      Added support for Gen10 plus UBM type 1/2/3 backplanes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.09" date="1622721600">-      Intermittent failures on Smart Carrier authentication</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.10" date="1630929600">-      To make Valid flag is always set to true initially so that CRC check can be performed on initstring partition and test if it is really valid.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.12" date="1652356800">-     Users need to update HPE SAS 12G Expander FW version 5.12 for FW compatibility
    due to a specific SPI flash devices is used on the Expander card. Carry over
    issue resolution with reference SID8638.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.12" date="1652443200">-     1\. In support of Micron 256Mb SPI ROM on the latest Shiner board
    
    2\. Provided a proper downgrade restriction to ensure FW compatibility with
    the latest HW</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.14" date="1655985600">-      Now Shiner Expander firmware boots up successfully at the time of Initialization.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.14" date="1656072000">-     1. Fix intermittent expander/drives missing issue during repeatedly power cycles
      2. Provide a proper downgrade restriction to ensure firmware compatibility with the latest flashes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.14-2.1" date="1663675200">-     Support SHA384</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.15" date="1683201600">-      Add support of new flash on the latest expander board.
      * Provided a proper downgrade restriction to ensure firmware compatibility with the latest flashes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.15-2.1" date="1686398400">-</changelog>
  </package>
  <package pkgid="c7ef359b4d69c2bbc787b68b2d0be9c8f67c5a63b456a0f4ecfc683155efa78c" name="firmware-smartarray-7b5e8400dd" arch="x86_64">
    <version epoch="0" ver="1.27" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27" date="1616414400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27-2.1" date="1655985600">-</changelog>
  </package>
  <package pkgid="dc9e06472297987797298a5b25dd3dc93a3977046073ab75807508416156fbfa" name="firmware-smartarray-815b1ae26d" arch="x86_64">
    <version epoch="0" ver="1.56" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00" date="1502884800">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56" date="1526558400">-           Supports Drive Zoning</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-2.1" date="1540209600">-     *Note:** If version 1.56 was previously installed, then it is not necessary to upgrade to version 1.56 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-2.1" date="1540296000">-      Added support for SUSE Linux Enterprise Server 15 OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-3.1" date="1547208000">-      Added HPE Smart Array P824i-p controller support</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56-4.1" date="1655985600">-</changelog>
  </package>
  <package pkgid="ebc0149009abfbce4b21c7edf203e71e06fcd7dc23ec33cadc550836dc6d6f3f" name="firmware-smartarray-9f082dffb4" arch="x86_64">
    <version epoch="0" ver="1.00" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00" date="1526558400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-2.1" date="1540209600">-     *Note:** If version 1.00 was previously installed, then it is not necessary to upgrade to version 1.00 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-2.1" date="1540296000">-      Added support for SUSE Linux Enterprise Server 15 OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-3.1" date="1544875200">-</changelog>
  </package>
  <package pkgid="e20089a164113d8f7f6a09fca8d6a964fb9645ce82ff89ef2edc4e91424c6e90" name="firmware-smartarray-f18fdefd0b" arch="x86_64">
    <version epoch="0" ver="1.79" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26" date="1474545600">-      In rare circumstances after multiple, successive reboots, a system with 28 large form factor drives might become unresponsive. Firmware v1.26 resolves the issue.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26-2.1" date="1496145600">-      **Customers who already installed firmware version 1.26 do not need to update to 1.26 (B).**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26-2.1" date="1496232000">-      Updated to support Service Pack for ProLiant version 2017.07.0
    
              **Note:** If version 1.26 was previously installed, then it is not necessary to upgrade to version 1.26 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50" date="1523448000">-      Enhanced debug capabilities</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.50-2.1" date="1526558400">-      Enhanced debug capabilities</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.78-1.1" date="1549368000">-      Added HPE Smart Array P824i-p controller support</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.79" date="1584360000">-     Drive may show up missing after a system reboot.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.79-2.1" date="1663588800">-      Update build environment with SHA384
      * Update OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.79-2.1" date="1663675200">-     Drive may show up missing after a system reboot.
    
    Please reference Customer Advisory a00098241en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.79-3.1" date="1680782400">-</changelog>
  </package>
  <package pkgid="1b2a16bef7e4d00123a924df0a7471fc0667ba9b094c7cf74c0d32d5f0da393c" name="firmware-smartarray-f36d4ef431" arch="x86_64">
    <version epoch="0" ver="0.39" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.37" date="1616414400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39" date="1632657600">-     It's the transition version before migrating to newer version 0.39(B). 0.39
    doesn't have any function change or issue fix, just to activate the new
    Product ID naming.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39" date="1632744000">-      It's the transition version before migrating to newer version 0.39(B). 0.39 doesn't have any function change or issue fix, just to activate the new Product ID naming.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39-2.1" date="1632830400">-      Modify Product ID to "A4200 Gen10P LFF" and "A4200 Gen10P SFF" to distinguish the different generation expander backplane.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39-3.1" date="1655985600">-</changelog>
  </package>
  <package pkgid="9825bba0a71f8489a9518b2f236364a68af9cdef801b47e1a19051ce783f48f8" name="firmware-smartarray-f7c07bdbbd" arch="x86_64">
    <version epoch="0" ver="6.22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.00" date="1647864000">-      Fixed a rare problem where backup power status was incorrectly reporting Charging instead of Failed.
      * Fixed an issue where obsoleted SCSI pass through command fails.
      * Loss of redundant path message is incorrectly reported on logical drive failure with single domain configuration.
      * Fixed an issue where SmartPath may not be used after LUN Reset
      * Fixed a potential controller lockup 0x1BC0 during write then read I/O with drive URE's.
      * Fixed an issue that Apollo 4200 Gen10 plus LFF expander backplanes are not discovered by controller.
      * Fixed an issue that range locked SED failed with reason error erasing RAID metadata during reboot and remains failed after clear configuration.
      * Fixed an issue where the file system may read incorrect data from a degraded RAID 5 or 6 logical drive.
      * Fixed an issue where the file system or application may read incorrect data when a backup power source is discharged completely, and system power loss occurs during a transformation.
      * Fixed an issue where the drive Fault LED is not turned ON when firmware fails a bad HBA drive connected to an expander during device discovery or hot-plug.
      * Fixed an issue of auto-rebuild not starting if two drives fail at the same time on a RAID10 or RAID6 logical drive having only one "Auto-Replace Drives" spare drive.
      * Fixed an issue where the drive Fault LED is turned ON for a few seconds when multiple configured drives are hot removed from a SES enclosure and then hot added
      * Fixed an issue where rebuild did not start after multiple iterations of drive failures.
      * Fixed an issue where the controller might fail to discover devices after a cable is hot-added.
      * Fixed a potential problem of inability to delete a SmartCache write-back logical drive.
      * Fixed an issue where 0x1789 POST message error code is displayed as healthy and there is no information in HII when all logical drives in the controller are offline.
      * Fixed an issue where the last logical drive in an array cannot be deleted in UEFI configuration tool.
      * Fixed an issue where build method is not listed for RAID 6 array creation in UEFI configuration tool.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.00-2.1" date="1651752000">-      Added support for DMTF PLDM Monitoring and Control for enhanced thermal monitoring
      * Added support for DMTF PLDM Redfish Device Enablement for Redfish Storage, StorageController, Port, Drive, Volume, &amp; CollectionCapabilities
      * Added support for DMTF PLDM Redfish Device Enablement for Volume POST &amp; DEL operations
      * Added support for DMTF Redfish StorageDevice.1.0.1 Events
      * Added support in firmware to enable logical drive transformation without backup power source on the controllers supporting data preservation.
      * Added support to return NCQ Priority Information for SATA drive to host.
      * Added support to blink the drive Predictive Failure (PF) LED during Predictive Spare Rebuilding (PSR) for drives that can be safely removed and replaced without causing a logical drive failure.
      * Added support to configure default setting for the drive write cache.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.00-2.1" date="1651838400">-      Fixed a rare problem where backup power status was incorrectly reporting Charging instead of Failed.
      * Fixed an issue where obsoleted SCSI pass through command fails.
      * Loss of redundant path message is incorrectly reported on logical drive failure with single domain configuration.
      * Fixed an issue where SmartPath may not be used after LUN Reset
      * Fixed a potential controller lockup 0x1BC0 during write then read I/O with drive URE's.
      * Fixed an issue that Apollo 4200 Gen10 plus LFF expander backplanes are not discovered by controller.
      * Fixed an issue that range locked SED failed with reason error erasing RAID metadata during reboot and remains failed after clear configuration.
      * Fixed an issue where the file system may read incorrect data from a degraded RAID 5 or 6 logical drive.
      * Fixed an issue where the file system or application may read incorrect data when a backup power source is discharged completely, and system power loss occurs during a transformation.
      * Fixed an issue where the drive Fault LED is not turned ON when firmware fails a bad HBA drive connected to an expander during device discovery or hot-plug.
      * Fixed an issue of auto-rebuild not starting if two drives fail at the same time on a RAID10 or RAID6 logical drive having only one "Auto-Replace Drives" spare drive.
      * Fixed an issue where the drive Fault LED is turned ON for a few seconds when multiple configured drives are hot removed from a SES enclosure and then hot added
      * Fixed an issue where rebuild did not start after multiple iterations of drive failures.
      * Fixed an issue where the controller might fail to discover devices after a cable is hot-added.
      * Fixed a potential problem of inability to delete a SmartCache write-back logical drive.
      * Fixed an issue where 0x1789 POST message error code is displayed as healthy and there is no information in HII when all logical drives in the controller are offline.
      * Fixed an issue where the last logical drive in an array cannot be deleted in UEFI configuration tool.
      * Fixed an issue where build method is not listed for RAID 6 array creation in UEFI configuration tool.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.32-2.1" date="1663675200">-     For 2022 Sep MSB usage</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.32-3.1" date="1669636800">-      Initial driver release for HPE SR Gen11 storage controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.61" date="1678190400">-      Added support for for Local Key Management SED adapter password.
      * Added support for reporting surface scan metrics for SSA, SSACLI.
      * Added support for improving secure erase time for disks supporting the WRITE SAME command.
      * Added support for a new persistent event log policy that overwrites old events with the most recently occurred events.
      * Added support PLDM firmware update
      * Added support PLDM firmware update for UBM.
      * Enable Redfish Name property of Volume resource which is optional on create. The value is the same as DisplayName property.
      * Report VendorID, ProductID and location informations for enclosure SEPs.
      * Redfish POST request to perform the Drive.Actions.#SecureErase ACTION will be rejected with the extended error message ResourceInUse if the targeted Drive is a SED that is not in the original factory state(OFS).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.61" date="1678276800">-      Fixed an issue where to create RAID 60 on 24 SATA SSDs resulted in controller lockup.
      * Fixed a performance drop issue on RAID 5 logical drives with 50/50 cache ratio on a 256K sequential read workload.
      * Fixed a parity inconsistency after RAID rebuild restarted with a new drive replacement.
      * Fixed an issue where a transforming logical drive fails when the controller is abruptly rebooted after logical drive deletion.
      * Fixed an issue where the logical drive failed during the heal array transformation.
      * Fixed an issue where rebuild does not start on an array with the spare disk.
      * Fixed an issue where the VDM requests were not being serviced in a timely manner when the controller was under high load.
      * Fixed controller lockup during clear configuration after SmartCache logical drive is moved from P-Series to E-Series controller.
      * Fixed an issue where not all permitted values were published to the WriteCachePolicy@Redfish.AllowableValues in VolumeCapabilities.
      * Fixed an issue where the VolumeCapabilities resource can be published with incorrect values for WriteCachePolicy@Redfish.AllowableValues when the controller's battery is charging.
      * Fixed an issue where the ControllerPasswordAccepted Redfish alert was sent with incorrect ControllerPasswordEntered messageId.
      * Fixed an issue where a drive's ServiceLabel is sometimes erroneously published with a leading zero on its Port number.
      * Fixed an issue where Redfish alerts generated early in the boot sequence were not reported to iLO.
      * Fixed an issue where a Redfish Volume create request is erroneously accepted when the request payload contains a WriteCachePolicy value conflicting with the existing cache configuration.
      * Fixed an issue where the ControllerPreviousError alert was sent with incorrect ControllerPreviouseFailure messageId and severity.
      * Fixed an issue where the BatteryCharging alert was sent with an incorrect severity on certain controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.61-2.1" date="1680004800">-     For Gen10 DL325 and DL385 servers usage.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.61-3.1" date="1681992000">-     For Patch bundle 3 of September 2022 SPP</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.22" date="1682078400">-</changelog>
  </package>
  <package pkgid="ea2d5be8c68415c3b6d5d8f76db9892cacd225d45a618ff19e927acfed55adc2" name="firmware-spsgen10" arch="x86_64">
    <version epoch="0" ver="04.01.05.002" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.339" date="1572868800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for a variety of security vulnerabilities. The
    following vulnerabilities have been addressed in this SPS release:
    CVE-2019-11090 and CVE-2019-11109. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381" date="1591617600">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for security vulnerability CVE-2020-0545. This
    issue is not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381-2.1" date="1597924800">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for security vulnerability CVE-2020-0545. This
    issue is not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381-2.1" date="1598011200">-     *Important Notes:**
    
    The Ver. 04.01.04.381(B) flash component contains an updated flash image. The
    actual firmware is exactly the same as was delivered with the original ver.
    04.01.04.381 flash component. The previous flash component had an issue that
    caused flashing to intermittently fail. It is not necessary to upgrade with
    Revision B if a previous component Revision was successfully used to upgrade
    the firmware to version 04.01.04.381 or for systems that originally shipped
    with version 04.01.04.381 firmware.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where systems configured with older versions of the Server
    Platform Services (SPS) Firmware, such as version 04.00.00.288 or older, may
    become inoperable after flashing to SPS firmware version 04.01.04.381. This
    releases contains an updated flash component for SPS Firmware 04.01.04.381
    which allows direct flashing from older firmware versions to the latest.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.423" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.505" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the Server Platform Services (SPS) Firmware addresses an issue
    where not all PCIe devices will be managed properly by the system when there
    are more than 16 PCIe devices present in the platform. This would include PCIe
    devices in PCIe slots or NVMe drives. This issue would typically manifest
    itself as iLO Firmware not properly reporting thermals from a device when a
    server was in this heavily loaded configuration.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.601" date="1644321600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2021.2 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.804-2.1" date="1660046400">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Addressed an issue where Intel reference systems were observed to
    intermittently fail to power on during extensive reboot testing.  This issue
    has not been reported on HPE servers.  This version of the Intel SPS firmware
    has been released as part of the Intel 2022.2 IPU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.901" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.05.002" date="1689336000">-</changelog>
  </package>
  <package pkgid="33eb3fbc6e370b6aafbb30705f1b6c0884e5c5a9b908b4b8a5ec2ab36b2f3b87" name="firmware-spsgen10plus" arch="x86_64">
    <version epoch="0" ver="04.04.04.500" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.053" date="1623326400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.058" date="1626436800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for Intel Optane Persistent Memory.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.062" date="1644321600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the System ROM contains updates aligned with the INTEL Whitley
    BKC WW52.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.202" date="1660046400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the INTEL PLR3.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.300" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="87c2a5be868737b4d13c99a19d037930aaf2b64fe1d30fa2bd7c9ce9fa2c22bd" name="firmware-system-a40" arch="x86_64">
    <version epoch="0" ver="2.80_2023_07_31" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-28-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1021) which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    Addressed an issue with AMD EPYC 1st Generation processors that can result in
    Corrected Memory Error Threshold Events being logged to the Integrated
    Management Log (IML) in cases when they should not be logged. The system
    monitors corrected errors and notifies the user when action is required due to
    an increased risk of an Uncorrected Memory Error. Corrected Memory errors are
    a normal and expected occurrence and do not always indicate a higher risk of
    an Uncorrected Memory Error. Previous revisions of the System ROM were
    incorrectly logging Corrected Memory Error Threshold Events to the IML when
    action should not have been required, resulting in unnecessary scheduled
    downtime to replace DIMMs. It is recommended that the System ROM be updated to
    this version before replacing DIMMs due to Corrected Memory Error Threshold
    Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1645704000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-16-2022" date="1657886400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigations for security vulnerabilities documented as CVE-2022-0778
    and CVE-2022-1292. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of LibPng library
    which provides mitigations for security vulnerability documented as CVE-
    CVE-2019-7317. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addressed an issue where systems using AMD 1st Generation EPYC processors
    would incorrectly count correctable DIMM errors from different channels into
    one channel thus possibly incorrectly causing Correctable Memory Error
    Threshold Exceeded errors to occur.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661947200">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigations for security vulnerabilities documented as
    CVE-2022-02068. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669809600">-     Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669896000">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-02-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where some Chinese translation is missing from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.E for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code NaplesPI 1.0.0.J for AMD 1st Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where an abnormal MR controller name would display when
    setting the system language to Japanese from RBSU, and then rebooting the
    system.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1688817600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code NaplesPI 1.0.0.K for AMD 1st Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 for AMD 1st Generation EPYC processors, and CVE-2022-23829 and
    CVE-2023-20593 for AMD 2nd Generation EPYC processor. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="20f05ef9712fa7987d120cc32a06bc75d82238806961f1ef2e40893298737bf1" name="firmware-system-a41" arch="x86_64">
    <version epoch="0" ver="2.80_2023_07_31" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_10-28-2021" date="1636459200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of AMD security
    patch (AMD-SN-1021) which provides mitigations for BIOS advisories and
    security vulnerabilities documented as CVE-2020-12954, CVE-2020-12961,
    CVE-2021-26331, CVE-2021-26335, CVE-2021-26315, CVE-2020-12946,
    CVE-2020-12951. CVE-2021-26336, CVE-2021-26337, CVE-2021-26338,
    CVE-2021-26320, CVE-2020-12944, CVE-2020-12988, CVE-2021-26329,
    CVE-2021-26330, CVE-2021-26321, CVE-2021-26323, CVE-2021-26325,
    CVE-2021-26326, CVE-2021-26322, CVE-2021-26327, and CVE-2021-26312. These
    issues are not unique to HPE servers.
    
    Addressed an issue where in the OS does not display the true CPU Max Core
    Frequency.
    
    Addressed an issue with AMD EPYC 1st Generation processors that can result in
    Corrected Memory Error Threshold Events being logged to the Integrated
    Management Log (IML) in cases when they should not be logged. The system
    monitors corrected errors and notifies the user when action is required due to
    an increased risk of an Uncorrected Memory Error. Corrected Memory errors are
    a normal and expected occurrence and do not always indicate a higher risk of
    an Uncorrected Memory Error. Previous revisions of the System ROM were
    incorrectly logging Corrected Memory Error Threshold Events to the IML when
    action should not have been required, resulting in unnecessary scheduled
    downtime to replace DIMMs. It is recommended that the System ROM be updated to
    this version before replacing DIMMs due to Corrected Memory Error Threshold
    Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_12-03-2021" date="1639656000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue that can result in Corrected Memory Error Threshold Events
    being logged to the Integrated Management Log (IML) incorrectly. The system
    monitors corrected memory errors and notifies the user via a Corrected Memory
    Error Threshold Event when action is recommended due to an increased risk of
    an uncorrected memory error. Previous versions of the System ROM may log a
    Corrected Memory Error Threshold Event in cases where the system is not at an
    increased risk of an uncorrected memory error. It is strongly recommended that
    the System ROM be updated to this version or later before replacing DIMMs due
    to Corrected Memory Error Threshold Events.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_02-10-2022" date="1645704000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where RAID volumes will be lost when using the "Restore
    Default Manufacturing Settings" feature.
    
    Addressed an issue where if the Administrator Password and Power-On Password
    are set, after clearing the Power-On Password, Administrator Password is also
    cleared.
    
    Addressed an issue where a system with Microsoft BitLocker enabled may
    incorrectly and intermittently prompt the user to unlock drives after a
    graceful OS reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-16-2022" date="1657886400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigations for security vulnerabilities documented as CVE-2022-0778
    and CVE-2022-1292. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of LibPng library
    which provides mitigations for security vulnerability documented as CVE-
    CVE-2019-7317. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    Addressed an issue where systems using AMD 1st Generation EPYC processors
    would incorrectly count correctable DIMM errors from different channels into
    one channel thus possibly incorrectly causing Correctable Memory Error
    Threshold Exceeded errors to occur.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661947200">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigations for security vulnerabilities documented as
    CVE-2022-02068. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669809600">-     Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669896000">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-02-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where some Chinese translation is missing from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.E for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code NaplesPI 1.0.0.J for AMD 1st Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where an abnormal MR controller name would display when
    setting the system language to Japanese from RBSU, and then rebooting the
    system.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1689940800">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code NaplesPI 1.0.0.K for AMD 1st Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 for AMD 1st Generation EPYC processors, and CVE-2022-23829 and
    CVE-2023-20593 for AMD 2nd Generation EPYC processor. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="53be727bf69b8551376d5e87d83936540c7da4cd460f105767081b68922f9d4e" name="firmware-system-a42" arch="x86_64">
    <version epoch="0" ver="2.80_2023_07_31" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-09-2022" date="1656072000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the AMD
    reference code for AMD 3rd Generation EPYC processors which addresses and
    issue with Windows 2022 AQ Secure Core certification.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-0778. This security vulnerability is documented in the CVE report
    site https://nvd.nist.gov/vuln/detail/CVE-2022-0778. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigation for BIOS security vulnerability documented
    as CVE-2022-27405. This security vulnerability is documented in the CVE report
    site https://nvd.nist.gov/vuln/detail/CVE-2022-27405. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661083200">-     Added support for the latest HPE UBM6 backplanes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661169600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the QR Code in ROM Based Setup Menu (RBSU) was not
    valid.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669809600">-     Implemented PMU Memory BIST test options for Milan platforms.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669896000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    Addressed an issue where the system would encounter an unexpected shutdown
    with "Internal processors error" in the IML while running the TPM scripts.
    
    Addressed an issue where the system boot-up would hang if the system has
    installed mutiple PCIe devices and set to "Dual Bifurcation" at the same time.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676289600">-     Add new System Configuration (RBSU) configuration options that allow
    controlling the processor's P0 (maximum) frequency. This includes the "Custom
    Pstate0" option with settings of "Auto" (default) and "Manual" and the
    "Pstate0 Frequency(MHz)" option that allows setting the P0 frequency. When
    the "Custom Pstate0" option is configured for "Manual", the value of the
    "Pstate0 Frequency(MHz)" is used for the processor's P0 frequency. When the
    "Custom Pstate0" option is configured for "Auto", the processor uses its
    normal, maximum P0 frequency and the "Pstate0 Frequency(MHz)" option is not
    configurable. In System Configuration (RBSU), these options are located under
    the BIOS/Processor Options. This setting has the following Redfish
    properties:
    
    /redfish/v1/systems/1/bios/settings/CustomPstate0
    
    /redfish/v1/systems/1/bios/settings/Pstate0Frequency</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683460800">-     The following options from RBSU will hide if using customized iPXE.
    
     iPXE Script Auto-Start
    
     iPXE Script Verification
    
     iPXE Auto-Start Script Location
    
     Network Location for iPXE Auto-Start Script</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.A for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the "Access Control Service" option under RBSU did
    not work.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1688817600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and
    CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Addressed an issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Addressed an issue where RSOD would occur when entering "System Information"
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="6186967198e195c727b4f9ecdfa033ee13c97fdcf25887e4822a085a327ebb7c" name="firmware-system-a43" arch="x86_64">
    <version epoch="0" ver="2.80_2023_07_31" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-09-2022" date="1656072000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the AMD
    reference code for AMD 3rd Generation EPYC processors which addresses and
    issue with Windows 2022 AQ Secure Core certification.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-0778. This security vulnerability is documented in the CVE report
    site https://nvd.nist.gov/vuln/detail/CVE-2022-0778. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigation for BIOS security vulnerability documented
    as CVE-2022-27405. This security vulnerability is documented in the CVE report
    site https://nvd.nist.gov/vuln/detail/CVE-2022-27405. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661083200">-     Added support for the latest HPE UBM6 backplanes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661169600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the QR Code in ROM Based Setup Menu (RBSU) was not
    valid.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669809600">-     Implemented PMU Memory BIST test options for Milan platforms.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669896000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    Addressed an issue where the system would encounter an unexpected shutdown
    with "Internal processors error" in the IML while running the TPM scripts.
    
    Addressed an issue where the system boot-up would hang if the system has
    installed mutiple PCIe devices and set to "Dual Bifurcation" at the same time.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676289600">-     Add new System Configuration (RBSU) configuration options that allow
    controlling the processors P0 (maximum) frequency. This includes the Custom
    Pstate0 option with settings of Auto (default) and Manual and the Pstate0
    Frequency(MHz) option that allows setting the P0 frequency. When the Custom
    Pstate0 option is configured for Manual, the value of the Pstate0
    Frequency(MHz) is used for the processors P0 frequency. When the Custom
    Pstate0 option is configured for Auto, the processor uses its normal, maximum
    P0 frequency and the Pstate0 Frequency(MHz) option is not configurable. In
    System Configuration (RBSU), these options are located under the
    BIOS/Processor Options. This setting has the following Redfish properties:
    
    /redfish/v1/systems/1/bios/settings/CustomPstate0
    
    /redfish/v1/systems/1/bios/settings/Pstate0Frequency</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683460800">-     The following options from RBSU will hide if using customized iPXE.
    
    iPXE Script Auto-Start
    
    iPXE Script Verification
    
    iPXE Auto-Start Script Location
    
    Network Location for iPXE Auto-Start Script</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.A for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the "Access Control Service" option under RBSU did
    not work.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1688817600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and
    CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Addressed an issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Addressed an issue where RSOD would occur when entering System Information
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="3fbbd408e47c9980d155acd7a34f56475efc1725374140d6f8cfd9ab9a04ed2f" name="firmware-system-a46" arch="x86_64">
    <version epoch="0" ver="2.80_2023_07_31" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-09-2022" date="1657281600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the AMD
    reference code for AMD 3rd Generation EPYC processors which addresses and
    issue with Windows 2022 AQ Secure Core certification.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-0778. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigation for BIOS security vulnerability documented
    as CVE-2022-27405. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    https://nvd.nist.gov/vuln/detail/CVE-2022-27405
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661342400">-     Added support for the latest HPE UBM6 backplanes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661428800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the QR Code in ROM Based Setup Menu (RBSU) was not
    valid.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1671624000">-     Implemented PMU Memory BIST test options for Milan platforms.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1671710400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    Addressed an issue where the system would encounter an unexpected shutdown
    with "Internal processors error" in the IML while running the TPM scripts.
    
    Addressed an issue where the system boot-up would hang if the system has
    installed mutiple PCIe devices and set to "Dual Bifurcation" at the same time.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676376000">-     Add new System Configuration (RBSU) configuration options that allow
    controlling the processors P0 (maximum) frequency. This includes the Custom
    Pstate0 option with settings of Auto (default) and Manual and the Pstate0
    Frequency(MHz) option that allows setting the P0 frequency. When the Custom
    Pstate0 option is configured for Manual, the value of the Pstate0
    Frequency(MHz) is used for the processors P0 frequency. When the Custom
    Pstate0 option is configured for Auto, the processor uses its normal, maximum
    P0 frequency and the Pstate0 Frequency(MHz) option is not configurable. In
    System Configuration (RBSU), these options are located under the
    BIOS/Processor Options. This setting has the following Redfish properties:
    
    /redfish/v1/systems/1/bios/settings/CustomPstate0
    
    /redfish/v1/systems/1/bios/settings/Pstate0Frequency</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676462400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683460800">-     The following options from RBSU will hide if using customized iPXE.
    
    iPXE Script Auto-Start
    
    iPXE Script Verification
    
    iPXE Auto-Start Script Location
    
    Network Location for iPXE Auto-Start Script</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.A for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the "Access Control Service" option under RBSU did
    not work.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1689249600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and
    CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Addressed an issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Addressed an issue where RSOD would occur when entering "System Information"
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="9dcb217d384c3383ec1eaa73d4344822a8ad8798d82b6c2ed6a335691b0da8b0" name="firmware-system-a47" arch="x86_64">
    <version epoch="0" ver="2.80_2023_07_31" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-09-2022" date="1657281600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the AMD
    reference code for AMD 3rd Generation EPYC processors which addresses and
    issue with Windows 2022 AQ Secure Core certification.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-0778. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigation for BIOS security vulnerability documented
    as CVE-2022-27405. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    https://nvd.nist.gov/vuln/detail/CVE-2022-27405
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661342400">-     Added support for the latest HPE UBM6 backplanes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661428800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the QR Code in ROM Based Setup Menu (RBSU) was not
    valid.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1670760000">-     Implemented PMU Memory BIST test options for Milan platforms.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1670846400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    Addressed an issue where the system would encounter an unexpected shutdown
    with "Internal processors error" in the IML while running the TPM scripts.
    
    Addressed an issue where the system boot-up would hang if the system has
    installed mutiple PCIe devices and set to "Dual Bifurcation" at the same time.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676289600">-     Add new System Configuration (RBSU) configuration options that allow
    controlling the processors P0 (maximum) frequency. This includes the Custom
    Pstate0 option with settings of Auto (default) and Manual and the Pstate0
    Frequency(MHz) option that allows setting the P0 frequency. When the Custom
    Pstate0 option is configured for Manual, the value of the Pstate0
    Frequency(MHz) is used for the processors P0 frequency. When the Custom
    Pstate0 option is configured for Auto, the processor uses its normal, maximum
    P0 frequency and the Pstate0 Frequency(MHz) option is not configurable. In
    System Configuration (RBSU), these options are located under the
    BIOS/Processor Options. This setting has the following Redfish properties:
    
    /redfish/v1/systems/1/bios/settings/CustomPstate0
    
    /redfish/v1/systems/1/bios/settings/Pstate0Frequency</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683460800">-     The following options from RBSU will hide if using customized iPXE.
    
    iPXE Script Auto-Start
    
    iPXE Script Verification
    
    iPXE Auto-Start Script Location
    
    Network Location for iPXE Auto-Start Script</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.A for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the "Access Control Service" option under RBSU did
    not work.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1689249600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and
    CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Addressed an issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Addressed an issue where RSOD would occur when entering "System Information"
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="a2ba5adae4dbd20c135938290d43ea5089ebd8fc8f7c1f1da1e225349a2ee6fd" name="firmware-system-a48" arch="x86_64">
    <version epoch="0" ver="2.80_2023_07_31" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_06-09-2022" date="1657281600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the AMD
    reference code for AMD 3rd Generation EPYC processors which addresses and
    issue with Windows 2022 AQ Secure Core certification.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-0778. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigation for BIOS security vulnerability documented
    as CVE-2022-27405. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    https://nvd.nist.gov/vuln/detail/CVE-2022-27405
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661342400">-     Added support for the latest HPE UBM6 backplanes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661428800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the QR Code in ROM Based Setup Menu (RBSU) was not
    valid.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1670760000">-     Implemented PMU Memory BIST test options for Milan platforms.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-30-2022" date="1670846400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    Addressed an issue where the system would encounter an unexpected shutdown
    with "Internal processors error" in the IML while running the TPM scripts.
    
    Addressed an issue where the system boot-up would hang if the system has
    installed mutiple PCIe devices and set to "Dual Bifurcation" at the same time.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676289600">-     Add new System Configuration (RBSU) configuration options that allow
    controlling the processors P0 (maximum) frequency. This includes the Custom
    Pstate0 option with settings of Auto (default) and Manual and the Pstate0
    Frequency(MHz) option that allows setting the P0 frequency. When the Custom
    Pstate0 option is configured for Manual, the value of the Pstate0
    Frequency(MHz) is used for the processors P0 frequency. When the Custom
    Pstate0 option is configured for Auto, the processor uses its normal, maximum
    P0 frequency and the Pstate0 Frequency(MHz) option is not configurable. In
    System Configuration (RBSU), these options are located under the
    BIOS/Processor Options. This setting has the following Redfish properties:
    
    /redfish/v1/systems/1/bios/settings/CustomPstate0
    
    /redfish/v1/systems/1/bios/settings/Pstate0Frequency</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683460800">-     The following options from RBSU will hide if using customized iPXE.
    
    iPXE Script Auto-Start
    
    iPXE Script Verification
    
    iPXE Auto-Start Script Location
    
    Network Location for iPXE Auto-Start Script</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.A for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the "Access Control Service" option under RBSU did
    not work.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1694088000">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and
    CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Addressed an issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Addressed an issue where RSOD would occur when entering "System Information"
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="37876558a4a72ae09c69be2fe26aa14ef7fc0b6c325ca95ff03e05844c0a1c39" name="firmware-system-u30" arch="x86_64">
    <version epoch="0" ver="2.90_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653480000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1687694400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="4c5c882e6bb04bc589511ec3c14f407daebdc1662c4a54cbc717c5a7f4681857" name="firmware-system-u31" arch="x86_64">
    <version epoch="0" ver="2.90_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1688040000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="e93f82e17ecfd2b20c2e32e0aa0db979697d02b758fd1e4e9145171a4d4208b1" name="firmware-system-u32" arch="x86_64">
    <version epoch="0" ver="2.90_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653480000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1687694400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="be336ab5fe51942f87c13a0df27f1d0c79858f7f40282aaba49d8f8bb52922a8" name="firmware-system-u33" arch="x86_64">
    <version epoch="0" ver="2.90_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1688040000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="c2f41c5a032c9ca1fc2e98422131097a7e74998b05cceaad9076cf85adc71f13" name="firmware-system-u34" arch="x86_64">
    <version epoch="0" ver="2.90_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1688040000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="381e595a2e4ceda44d2edec7876fde006c88303ef2f93a6ff1344da14bd94914" name="firmware-system-u37" arch="x86_64">
    <version epoch="0" ver="2.90_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1654084800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676894400">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676980800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1687780800">-     This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site.  This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.</changelog>
  </package>
  <package pkgid="791c481ffe1b67c2adab5c60f3ffb82a9980b7d9296ecbe2c6203f1e08329531" name="firmware-system-u38" arch="x86_64">
    <version epoch="0" ver="2.90_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.69_08-19-2022" date="1661947200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Enhanced the system thermal settings to provide improved acoustics when the
    server is configured in legacy boot mode with M.2 SSDs.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676894400">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676980800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1687608000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="bb6e46d313d379ae63a5235f153fd89e99cbe8e8f043b492173f6f2746bf5e49" name="firmware-system-u39" arch="x86_64">
    <version epoch="0" ver="2.90_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1688731200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="7d35ccd1418a2033e09479704d7a65f66148171e757b32cb8a4301c33e319b3b" name="firmware-system-u40" arch="x86_64">
    <version epoch="0" ver="2.90_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1688731200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="490a7add0358a32048a036551acd9d07544ac2ca0b1444d6035069660b9b8e1a" name="firmware-system-u41" arch="x86_64">
    <version epoch="0" ver="2.90_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1653652800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1689940800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="ca63d405892fed542d2f86db73479ba5cf36e7e5bec6d3b86419c2f7663f5d41" name="firmware-system-u43" arch="x86_64">
    <version epoch="0" ver="2.80_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632398400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where High Precision Event Timer in Windows was not showing
    up in device manager.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_10-21-2021" date="1636372800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2021.2 which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0157. These security vulnerabilities
    are documented in the CVE report site. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-20-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2 which
    provides mitigations for security vulnerabilities CVE-2021-0092,
    CVE-2021-0127, CVE-2021-0156 and CVE-2021-0157. These issues are not unique to
    HPE servers.
    
    Fixed an issue where system boot mode changed to Legacy mode from UEFI mode
    after IP flash complete and system may hang when entering IP after setting to
    UEFI mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_04-14-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21125, CVE-2022-21123, CVE-2022-21127,
    CVE-2022-21151, and CVE-2022-0005. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00617 and INTEL-SA-00614. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0154, CVE-2021-0189, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST with
    error messages about Unknown Initialization Error and DIMM Initialization
    Error. For more details please read the below advisory:
    https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778 ), CVE-2022-1292
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2068 ) and CVE-2022-2068
    (https://nvd.nist.gov/vuln/detail/CVE-2022-1292). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of Libpng library
    which provides mitigations for security vulnerability documented as
    CVE-2019-7317 (https://nvd.nist.gov/vuln/detail/CVE-2019-7317). This issue is
    not unique to HPE servers.
    
    Removed PCIe bifurcation option in the ROM Based Setup Utility (RBSU) because
    it is not supported through ROM on this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where firmware BootTimer would cause a black screen hang
    when switching TPM 1.2 to 2.0.
    
    Addressed an issue TPM Visibility option in ROM Based Setup Utility (RBSU)
    would be greyed out after upgrading the system ROM from 2.54 to 2.58.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUN. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture defaults.
    
    Addressed an issue where some Chinese and Japaneses translations were missing
    from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-38087. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed an issue where the power-on-password dialog popped up even though
    user did not set a password.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-20-2023" date="1688126400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="4ffd6465f19a665082b86b317e42f36e8616640dca66c47860878132e300e839" name="firmware-system-u44" arch="x86_64">
    <version epoch="0" ver="2.80_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632398400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where High Precision Event Timer in Windows was not showing
    up in device manager.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_10-21-2021" date="1636372800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2021.2 which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0157. These security vulnerabilities
    are documented in the CVE report site. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-20-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2 which
    provides mitigations for security vulnerabilities CVE-2021-0092,
    CVE-2021-0127, CVE-2021-0156 and CVE-2021-0157. These issues are not unique to
    HPE servers.
    
    Fixed an issue where system boot mode changed to Legacy mode from UEFI mode
    after IP flash complete and system may hang when entering IP after setting to
    UEFI mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_04-14-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21125, CVE-2022-21123, CVE-2022-21127,
    CVE-2022-21151, and CVE-2022-0005. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00617 and INTEL-SA-00614. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0154, CVE-2021-0189, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778 ), CVE-2022-1292
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2068 ) and CVE-2022-2068
    (https://nvd.nist.gov/vuln/detail/CVE-2022-1292). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of Libpng library
    which provides mitigations for security vulnerability documented as
    CVE-2019-7317 (https://nvd.nist.gov/vuln/detail/CVE-2019-7317). This issue is
    not unique to HPE servers.
    
    Removed PCIe bifurcation option in the ROM Based Setup Utility (RBSU) because
    it is not supported through ROM on this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where firmware BootTimer would cause a black screen hang
    when switching TPM 1.2 to 2.0.
    
    Addressed an issue TPM Visibility option in ROM Based Setup Utility (RBSU)
    would be greyed out after upgrading the system ROM from 2.54 to 2.58.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUN. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture defaults.
    
    Addressed an issue where some Chinese and Japaneses translations were missing
    from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-38087. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed an issue where the power-on-password dialog popped up even though
    user did not set a password.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-20-2023" date="1688126400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="c6f377b507e4a5503673af26767ebdd3ca29d75dbd647f84eae2e4df9b9fb472" name="firmware-system-u45" arch="x86_64">
    <version epoch="0" ver="2.90_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.66_05-17-2022" date="1654084800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue of an incomplete mitigation for a BIOS advisory and
    security vulnerabilities documented as CVE-2021-0159, CVE-2021-33123, and
    CVE-2021-33124. These security vulnerabilities are documented in Intel
    Security Advisory INTEL-SA-00601. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1659960000">-     Added support for One Button Secure Erase (OBSE) and encryption for Broadcom
    MR controller series on Intel Gen10 systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_07-14-2022" date="1660046400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerability documented as
    CVE-2022-2068 (ttps://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    Addressed an issue where the system will hang with Red Screen of Death (RSOD)
    in ROM Based Setup Utility (RBSU) when user tries to switch [Image
    Description] choices for NVMe devices under the Firmware Update Page.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676894400">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676980800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1687780800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="378ad08255eeb6bc827c96030d9a8de02ea179924ea45e8b472c69c8ee549868" name="firmware-system-u46" arch="x86_64">
    <version epoch="0" ver="1.80_2023_07_05" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_06-01-2022" date="1654516800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21136, and CVE-2022-21151. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616, and
    INTEL-SA-00617. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2022-0004. These security vulnerabilities
    are documented in Intel Security Advisory INTEL-SA-00613. These issues are not
    unique to HPE servers
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where in the ROM Based Setup Utility (RBSU), PMem QoS
    Options cannot be set as disabled under Performance Options work profile with
    system ROM v1.58.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where incorrect Drive Location is reported for HPE MegaRAID
    Gen10 Plus Storage Controllers under Secure Erase Report
    
    Addressed an issue where PCI network boot option shows only one port for Intel
    E810-2CQDA2 Ethernet 100Gb 2-port QSFP28 Adapter for HPE (P41611-B21) when
    bifurcation is enabled. More details can be found in the Customer Advisory
    (CA) link below: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-
    a00118261en_us
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    Addressed an issue where Advanced Memory Protection (AMP) status displays
    Degraded A3DC on iLO web page but there is no memory failure displayed in iLO.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.62_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_08-11-2022" date="1661169600">-     *Important Notes:**
    
    For customers who had already upgraded to v1.62 7/14/2022 ROM, it is highly
    recommended to upgrade to this version v1.64 if customers have Intel Optane
    Persistent Memory 200 Series installed in their system.
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue from previous published ROM release v1.62 7/14/2022 in
    which systems with Intel Optane Persistent Memory 200 Series may not appear
    under an OS.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.
    
    This revision of the System ROM includes an updated revision of Intel VROC
    UEFI driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where "Reboot Required" radio button isn't highlighted
    after BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676289600">-     Added "Important: Intel(R) NVMe and Intel(R) VROC are not supported when the
    Boot Mode is configured in Legacy BIOS Mode." message into the RBSU help
    description for Intel NVMe VROC option.
    
    Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".
    
    Downgraded several debug messages from DEBUG_ERROR to DEBUG_INFO level.
    Removed unnecessary error messages in BIOS serial log.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683547200">-     Added new System Configuration (RBSU) configuration options that allow user
    input frequency scaling of the processor's internal busses. In System
    Configuration (RBSU), the options is located under "Uncore Frequency Scaling"
    option in "Power and Performance Options". This setting has the following
    Redfish properties.
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMax
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMin
    
    Added new System Configuration (RBSU) configuration options that allow
    disabling Dynamic Loadline switches between EPB modes depending on the P-state
    behavior. Enable or disable the switch could affect the power and performance
    by condition. In System Configuration (RBSU), the options is located under
    "Power and Performance Options". This setting has the following Redfish
    properties.
    
    /redfish/v1/systems/1/bios/settings/DynamicLoadlineSwitch</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system would hang after uploading the Samsung
    1733/1735 U.3 NVMe Drive firmware through FMP.
    
    Addressed an issue where PMEM NUMA nodes were not continuous (3, 5) under 8 8
    isolated NUMA nodes configuration.
    
    Addressed an issue where a drive could not be unmounted when hot-plug
    interrupt was generated during the DPC recovery process, with the event going
    over the DPC threshold.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1687694400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505, CVE-2022-40982,
    CVE-2023-23908 and CVE-2022-41804. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where the RBSU "Storage Device Information" was empty when
    VROC is enabled.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address the issue where the TPM status displayed in RBSU and iLO web page was
    not in sync.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering "System Information"
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="f4a593485591282e2c62b48c53455dc99ced529b5f45a03f1893b7423ec08b1d" name="firmware-system-u47" arch="x86_64">
    <version epoch="0" ver="1.80_2023_07_05" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_05-12-2022" date="1654516800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21136, and CVE-2022-21151. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616, and
    INTEL-SA-00617. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2022-0004. These security vulnerabilities
    are documented in Intel Security Advisory INTEL-SA-00613. These issues are not
    unique to HPE servers
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where in the ROM Based Setup Utility (RBSU), PMem QoS
    Options cannot be set as disabled under Performance Options work profile with
    system ROM v1.58.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where incorrect Drive Location is reported for HPE MegaRAID
    Gen10 Plus Storage Controllers under Secure Erase Report
    
    Addressed an issue where PCI network boot option shows only one port for Intel
    E810-2CQDA2 Ethernet 100Gb 2-port QSFP28 Adapter for HPE (P41611-B21) when
    bifurcation is enabled. More details can be found in the Customer Advisory
    (CA) link below
    
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00118261en_us
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    Addressed an issue where Advanced Memory Protection (AMP) status displays
    Degraded A3DC on iLO web page but there is no memory failure displayed in iLO.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.62_07-14-2022" date="1660046400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_08-11-2022" date="1661342400">-     *Important Notes:**
    
    For customers who had already upgraded to v1.62 7/14/2022 ROM, it is highly
    recommended to upgrade to this version v1.64 if customers have Intel Optane
    Persistent Memory 200 Series installed in their system.
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue from previous published ROM release v1.62 7/14/2022 in
    which systems with Intel Optane Persistent Memory 200 Series may not appear
    under an OS.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.
    
    This revision of the System ROM includes an updated revision of Intel VROC
    UEFI driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676376000">-     Added "Important: Intel(R) NVMe and Intel(R) VROC are not supported when the
    Boot Mode is configured in Legacy BIOS Mode." message into the RBSU help
    description for Intel NVMe VROC option.
    
    Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when Workload
    Profile sets to Custom and Power Regulator sets to OS Control Mode.
    
    Downgraded several debug messages from DEBUG_ERROR to DEBUG_INFO level.
    Removed unnecessary error messages in BIOS serial log.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676462400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683460800">-     Added new System Configuration (RBSU) configuration options that allow user
    input frequency scaling of the processor's internal busses. In System
    Configuration (RBSU), the options is located under Uncore Frequency Scaling
    option in Power and Performance Options. This setting has the following
    Redfish properties.
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMax
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMin
    
    Added new System Configuration (RBSU) configuration options that allow
    disabling Dynamic Loadline switches between EPB modes depending on the P-state
    behavior. Enable or disable the switch could affect the power and performance
    by condition. In System Configuration (RBSU), the options is located under
    Power and Performance Options. This setting has the following Redfish
    properties.
    
    /redfish/v1/systems/1/bios/settings/DynamicLoadlineSwitch</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system would hang after uploading the Samsung
    1733/1735 U.3 NVMe Drive firmware through FMP.
    
    Addressed an issue where PMEM NUMA nodes were not continuous (3, 5) under 8 8
    isolated NUMA nodes configuration.
    
    Addressed an issue where a drive could not be unmounted when hot-plug
    interrupt was generated during the DPC recovery process, with the event going
    over the DPC threshold.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1687780800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505, CVE-2022-40982,
    CVE-2023-23908 and CVE-2022-41804. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where the RBSU "Storage Device Information" was empty when
    VROC is enabled.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address the issue where the TPM status displayed in RBSU and iLO web page was
    not in sync.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering System Information from
    RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="ce9cbb34856e84aa3af43dc468372fd6c72a3ad455bbdb8bef28d63532df12ed" name="firmware-system-u48" arch="x86_64">
    <version epoch="0" ver="2.80_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.52_09-16-2021" date="1632398400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.1 guidance. None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where High Precision Event Timer in Windows was not showing
    up in device manager.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.54_10-21-2021" date="1636372800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance. None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2021.2 which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0157. These security vulnerabilities
    are documented in the CVE report site. This issue is not unique to HPE
    servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.56_01-20-2022" date="1644321600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes Intel Platform Update 2021.2 which
    provides mitigations for security vulnerabilities CVE-2021-0092,
    CVE-2021-0127, CVE-2021-0156 and CVE-2021-0157. These issues are not unique to
    HPE servers.
    
    Fixed an issue where system boot mode changed to Legacy mode from UEFI mode
    after IP flash complete and system may hang when entering IP after setting to
    UEFI mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_04-14-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21125, CVE-2022-21123, CVE-2022-21127,
    CVE-2022-21151, and CVE-2022-0005. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00617 and INTEL-SA-00614. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0154, CVE-2021-0189, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778 ), CVE-2022-1292
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2068 ) and CVE-2022-2068
    (https://nvd.nist.gov/vuln/detail/CVE-2022-1292). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of Libpng library
    which provides mitigations for security vulnerability documented as
    CVE-2019-7317 (https://nvd.nist.gov/vuln/detail/CVE-2019-7317). This issue is
    not unique to HPE servers.
    
    Removed PCIe bifurcation option in the ROM Based Setup Utility (RBSU) because
    it is not supported through ROM on this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where firmware BootTimer would cause a black screen hang
    when switching TPM 1.2 to 2.0.
    
    Addressed an issue TPM Visibility option in ROM Based Setup Utility (RBSU)
    would be greyed out after upgrading the system ROM from 2.54 to 2.58.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUN. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture defaults.
    
    Addressed an issue where some Chinese and Japaneses translations were missing
    from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-38087. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed an issue where the power-on-password dialog popped up even though
    user did not set a password.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-20-2023" date="1688040000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="e9f70bb0378a7bbd2a111d9978ec087e74a077933961ebf332ca3d5ae2756e49" name="firmware-system-u50" arch="x86_64">
    <version epoch="0" ver="1.80_2023_07_05" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_05-12-2022" date="1654516800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21136, and CVE-2022-21151. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616, and
    INTEL-SA-00617. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2022-0004. These security vulnerabilities
    are documented in Intel Security Advisory INTEL-SA-00613. These issues are not
    unique to HPE servers
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where in the ROM Based Setup Utility (RBSU), PMem QoS
    Options cannot be set as disabled under Performance Options work profile with
    system ROM v1.58.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where incorrect Drive Location is reported for HPE MegaRAID
    Gen10 Plus Storage Controllers under Secure Erase Report
    
    Addressed an issue where PCI network boot option shows only one port for Intel
    E810-2CQDA2 Ethernet 100Gb 2-port QSFP28 Adapter for HPE (P41611-B21) when
    bifurcation is enabled. More details can be found in the Customer Advisory
    (CA) link below
    
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00118261en_us
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    Addressed an issue where Advanced Memory Protection (AMP) status displays
    Degraded A3DC on iLO web page but there is no memory failure displayed in iLO.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.62_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_08-11-2022" date="1661169600">-     *Important Notes:**
    
    For customers who had already upgraded to v1.62 7/14/2022 ROM, it is highly
    recommended to upgrade to this version v1.64 if customers have Intel Optane
    Persistent Memory 200 Series installed in their system.
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue from previous published ROM release v1.62 7/14/2022 in
    which systems with Intel Optane Persistent Memory 200 Series may not appear
    under an OS.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.
    
    This revision of the System ROM includes an updated revision of Intel VROC
    UEFI driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676289600">-     Added "Important: Intel(R) NVMe and Intel(R) VROC are not supported when the
    Boot Mode is configured in Legacy BIOS Mode." message into the RBSU help
    description for Intel NVMe VROC option.
    
    Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when Workload
    Profile sets to Custom and Power Regulator sets to OS Control Mode.
    
    Downgraded several debug messages from DEBUG_ERROR to DEBUG_INFO level.
    Removed unnecessary error messages in BIOS serial log.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683547200">-     Added new System Configuration (RBSU) configuration options that allow user
    input frequency scaling of the processor's internal busses. In System
    Configuration (RBSU), the options is located under Uncore Frequency Scaling
    option in Power and Performance Options. This setting has the following
    Redfish properties.
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMax
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMin
    
    Added new System Configuration (RBSU) configuration options that allow
    disabling Dynamic Loadline switches between EPB modes depending on the P-state
    behavior. Enable or disable the switch could affect the power and performance
    by condition. In System Configuration (RBSU), the options is located under
    Power and Performance Options. This setting has the following Redfish
    properties.
    
    /redfish/v1/systems/1/bios/settings/DynamicLoadlineSwitch</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system would hang after uploading the Samsung
    1733/1735 U.3 NVMe Drive firmware through FMP.
    
    Addressed an issue where PMEM NUMA nodes were not continuous (3, 5) under 8 8
    isolated NUMA nodes configuration.
    
    Addressed an issue where a drive could not be unmounted when hot-plug
    interrupt was generated during the DPC recovery process, with the event going
    over the DPC threshold.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1688040000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505, CVE-2022-40982,
    CVE-2023-23908 and CVE-2022-41804. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where the RBSU "Storage Device Information" was empty when
    VROC is enabled.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address the issue where the TPM status displayed in RBSU and iLO web page was
    not in sync.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering System Information from
    RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="302f6bdd200c358e03f4cfaa119e6fe52b130c362b7a8d62641667c8cbf8fe66" name="firmware-system-u56" arch="x86_64">
    <version epoch="0" ver="1.80_2023_07_05" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_05-12-2022" date="1654516800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21136, and CVE-2022-21151. These security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00616, and
    INTEL-SA-00617. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2022-0004. These security vulnerabilities
    are documented in Intel Security Advisory INTEL-SA-00613. These issues are not
    unique to HPE servers
    
    This revision of the System ROM includes the latest revision of openSSL and
    LibPng which provides mitigation for BIOS security vulnerabilities documented
    as CVE-2022-1292 and CVE-2019-7317. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where in the ROM Based Setup Utility (RBSU), PMem QoS
    Options cannot be set as disabled under Performance Options work profile with
    system ROM v1.58.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where incorrect Drive Location is reported for HPE MegaRAID
    Gen10 Plus Storage Controllers under Secure Erase Report
    
    Addressed an issue where PCI network boot option shows only one port for Intel
    E810-2CQDA2 Ethernet 100Gb 2-port QSFP28 Adapter for HPE (P41611-B21) when
    bifurcation is enabled. More details can be found in the Customer Advisory
    (CA) link below
    
    https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00118261en_us
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where the IPMI Watchdog Timer (WDT) would continuously be
    re-enabled on reboots even after being disabled which causes the system to
    continuously reboot after the timeout is triggered.
    
    Addressed an issue where Advanced Memory Protection (AMP) status displays
    Degraded A3DC on iLO web page but there is no memory failure displayed in iLO.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.62_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_08-11-2022" date="1661169600">-     *Important Notes:**
    
    For customers who had already upgraded to v1.62 7/14/2022 ROM, it is highly
    recommended to upgrade to this version v1.64 if customers have Intel Optane
    Persistent Memory 200 Series installed in their system.
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue from previous published ROM release v1.62 7/14/2022 in
    which systems with Intel Optane Persistent Memory 200 Series may not appear
    under an OS.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerabilities are documented in Intel Security Advisory INTEL-SA-00657. This
    issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerability documented as CVE-2021-33060. This security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00686. These issues are not
    unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    Addressed an issue where Microsoft Secured-core is not grayed-out when TPM is
    not present.
    
    Addressed an issue where the QR code in Rom Based Set Up menu linked to a
    discontinued site.
    
    Addressed an issue where a hot plug event occurring before event handler
    operates would cause ESXi kernel to call exception waiting for hot plug status
    from device and then triggered an ASSERT with PSOD (Purple Screen Of Death).
    
    Addressed an issue with displaying FW versions for Intel's latest ATS-M GPU
    cards.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.
    
    This revision of the System ROM includes an updated revision of Intel VROC
    UEFI driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676289600">-     Added "Important: Intel(R) NVMe and Intel(R) VROC are not supported when the
    Boot Mode is configured in Legacy BIOS Mode." message into the RBSU help
    description for Intel NVMe VROC option.
    
    Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when Workload
    Profile sets to Custom and Power Regulator sets to OS Control Mode.
    
    Downgraded several debug messages from DEBUG_ERROR to DEBUG_INFO level.
    Removed unnecessary error messages in BIOS serial log.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683547200">-     Added new System Configuration (RBSU) configuration options that allow user
    input frequency scaling of the processor's internal busses. In System
    Configuration (RBSU), the options is located under Uncore Frequency Scaling
    option in Power and Performance Options. This setting has the following
    Redfish properties.
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMax
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMin
    
    Added new System Configuration (RBSU) configuration options that allow
    disabling Dynamic Loadline switches between EPB modes depending on the P-state
    behavior. Enable or disable the switch could affect the power and performance
    by condition. In System Configuration (RBSU), the options is located under
    Power and Performance Options. This setting has the following Redfish
    properties.
    
    /redfish/v1/systems/1/bios/settings/DynamicLoadlineSwitch</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system would hang after uploading the Samsung
    1733/1735 U.3 NVMe Drive firmware through FMP.
    
    Addressed an issue where PMEM NUMA nodes were not continuous (3, 5) under 8 8
    isolated NUMA nodes configuration.
    
    Addressed an issue where a drive could not be unmounted when hot-plug
    interrupt was generated during the DPC recovery process, with the event going
    over the DPC threshold.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1688299200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505, CVE-2022-40982,
    CVE-2023-23908 and CVE-2022-41804. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where the RBSU "Storage Device Information" was empty when
    VROC is enabled.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address the issue where the TPM status displayed in RBSU and iLO web page was
    not in sync.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering System Information from
    RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="aae47441ad2615cbad9e061459ee5ec0a9f99fce022351cad5dec28ec84edff9" name="firmware-system-u60" arch="x86_64">
    <version epoch="0" ver="1.80_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_01-13-2022" date="1646654400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the power-on password and the administrator passwords
    were both cleared when clearing one or the other. With this fix the two
    passwords will be treated independently as intended.
    
    Removed Dynamic Power Capping Functionality option from the RBSU menu as this
    option is not supported on this platform.
    
    Removed TPM1.2 option from the RBSU menu as this option is not supported on
    this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_03-24-2022" date="1649937600">-     Changed the default setting of Intel VT-d Virtualization to enabled to align
    with all other Gen10 and Gen10 Plus ProLiant servers. This will not affect the
    current setting of this option when upgrading to the v1.54 04/01/2022 System
    ROM. However, when defaults are restored on a system with the v1.54 or later
    System ROM, Intel VT-d Virtualization will be enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_03-24-2022" date="1650024000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the Intel X710-DA2 Ethernet 10Gb 2-port SFP Adapter
    intermittently encounters PCIe bandwidth downgrade.
    
    Addressed an issue where Windows 2022 has a yellow bang with unknown device
    when Microsoft(R) Secured-core is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_04-18-2022" date="1652184000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21151, CVE-2022-0005,
    CVE-2021-33122, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33103. These
    security vulnerabilities are documented in the CVE report site. This issue is
    not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of freetype
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where system would not reboot if reboot test was executed
    after PCIe Bifurcation.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667822400">-     Added warning message Intel(R) NVMe is not supported when the Boot Mode is
    configured in Legacy BIOS Mode.
    
    This revision of the System ROM includes an updated revision of VROC UEFI
    driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21198 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where "Reboot Required" radio button isn't highlighted
    after BIOS restore.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837, CVE-2022-38090 and
    CVE-2022-30704. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where RBSU PCI device information page does not display the
    Intel VROC SATA firmware firmware version correctly.
    
    Addressed an issue where NVMe drive info cannot display properly in iLO web
    when PCH VMD is enabled.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the field "DIMM Map-Out Reason" of OEM SMBIOS type
    232 would update incorrectly per DIMM status.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages were
    not synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-20-2023" date="1688040000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering "System Information"
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="bdf93878ca6f41bdb778dceb3498ecb45263244cd04b285ffbc6d7cd5fc6f8ce" name="firmware-system-u61" arch="x86_64">
    <version epoch="0" ver="1.80_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.54_01-13-2022" date="1646654400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the power-on password and the administrator passwords
    were both cleared when clearing one or the other. With this fix the two
    passwords will be treated independently as intended.
    
    Removed Dynamic Power Capping Functionality option from the RBSU menu as this
    option is not supported on this platform.
    
    Removed TPM1.2 option from the RBSU menu as this option is not supported on
    this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_04-01-2022" date="1649937600">-     Changed the default setting of Intel VT-d Virtualization to enabled to align
    with all other Gen10 and Gen10 Plus ProLiant servers. This will not affect the
    current setting of this option when upgrading to the v1.54 04/01/2022 System
    ROM. However, when defaults are restored on a system with the v1.54 or later
    System ROM, Intel VT-d Virtualization will be enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.56_04-01-2022" date="1650024000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SATA drives were intermittently missing.
    
    Addressed an issue where Windows 2022 has a yellow bang with unknown device
    when Microsoft(R) Secured-core is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_04-18-2022" date="1652184000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21151, CVE-2022-0005,
    CVE-2021-33122, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33103. These
    security vulnerabilities are documented in the CVE report site. This issue is
    not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of freetype
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where system would not reboot if reboot test was executed
    after PCIe Bifurcation.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667822400">-     Added warning message Intel(R) NVMe is not supported when the Boot Mode is
    configured in Legacy BIOS Mode.
    
    This revision of the System ROM includes an updated revision of VROC UEFI
    driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21198 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837, CVE-2022-38090 and
    CVE-2022-30704. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where RBSU PCI device information page does not display the
    Intel VROC SATA firmware firmware version correctly.
    
    Addressed an issue where NVMe drive info cannot display properly in iLO web
    when PCH VMD is enabled.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_05-02-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the field DIMM Map-Out Reason of OEM SMBIOS type 232
    would update incorrectly per DIMM status.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages were
    not synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-20-2023" date="1688040000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering System Information from
    RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="768e581dc040a4fdffc2f40502d06890def1f1cb01fb34ec60ea7630c97ffe1c" name="firmware-system-u64" arch="x86_64">
    <version epoch="0" ver="1.80_2023_07_20" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_06-30-2022" date="1663329600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667822400">-     Added warning message Intel(R) NVMe is not supported when the Boot Mode is
    configured in Legacy BIOS Mode.
    
    This revision of the System ROM includes an updated revision of VROC UEFI
    driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21198 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837, CVE-2022-38090 and
    CVE-2022-30704. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where RBSU PCI device information page does not display the
    Intel VROC SATA firmware firmware version correctly.
    
    Addressed an issue where NVMe drive info cannot display properly in iLO web
    when PCH VMD is enabled.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the field DIMM Map-Out Reason of OEM SMBIOS type 232
    would update incorrectly per DIMM status.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages were
    not synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-20-2023" date="1688126400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering System Information from
    RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="4935b552436d83d879d9ad9a0f5cb2240b06b4d141e23bf82db5ad12f14bc2b5" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.22.18_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.22.18-1.sles15sp4" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="1e73e6897a75968bfd2cb05a0efcdeea22eb757864bcab9f0c954090de748e06" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.22.18_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.22.18-1.sles15sp3" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="beb133d4701e4e27375f6810513d845406e717f9e560b46abd4858312970cd30" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.8.2_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="170e901d5ba71eaa84f88b6425dacb298101f23abfbb546be84fc9ce81e0f18c" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.8.2_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="988665e209327eb69ff8188c317039511cdac34a21999f737dbe1e8f2e78b307" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.13.16_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="dbb9c2ec57aa20262751c4b5deafba56a49367589217f6877e7ef0b2b68c016b" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.13.16_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="48a0bbf13c0edd899a9a79965a1f90ba70f1f4de1b2861f0b28d0af5282ef4ab" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.18.11_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="683afd647a9f843d5bc24cd45b6c9362c2cc57cdad5f6edc60087b6e627b37e3" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.18.11_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="4ab4d6d38343a542ffa49687c46602dc38c390cdb88a29b46e1158d0677c4180" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.17.11_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="fc32784d97ddfe192d1da1b139a0be7f826b7904e2b44546cf52a879adb38464" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.17.11_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="e9bc812bd45467858155b711da48cf262df14a2dfd4c0c63e594193c72270c1b" name="hpe-emulex-smartsan-enablement-kit" arch="x86_64">
    <version epoch="0" ver="1.0.0.0" rel="4"/>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-1" date="1446465600">- Initial development</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-2" date="1469016000">- Added support the HPE StoreFabric 84E 4-port Fibre Channel Host Bus Adapter</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-3" date="1478174400">- Added support for HPE StoreFabric SN1200E 1P &amp; 2P, HPE StoreFabric SN1600E 1P &amp; 2P</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-4" date="1480334400">- Added support for HPE Synergy 3530C</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-4" date="1480507200">- Added Obsoletes tag since the rpm has been changed from noarch to x86_64 bit</changelog>
  </package>
  <package pkgid="ebf070249634532d8ba0653d3ce57c5c3f2c3b1f57acf974e3b3a92b5e95c76d" name="hpe-qlogic-smartsan-enablement-kit" arch="x86_64">
    <version epoch="0" ver="3.3" rel="3"/>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-1" date="1448280000">- Initial development</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-2" date="1479384000">- Added support for SN1600Q 1P &amp; 2P devices</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-3" date="1480334400">- Added support for 84Q and 3830C devices</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-3" date="1480507200">- Added Obsoletes tag since the rpm has been changed from noarch to x86_64 bit</changelog>
  </package>
  <package pkgid="ad346895114b9c6a215aa3584407d47d6fc51882250ffaff98ec30bc352a298e" name="hponcfg" arch="x86_64">
    <version epoch="0" ver="6.0.0" rel="0"/>
    <changelog author="Suhas MG &lt;suhas.mg@hpe.com&gt; 5.1.0-0" date="1502193600">- v5.1.0 is mainly targeted for iLO 5 1.15</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.2.0-0" date="1506340800">- v5.2.0 is mainly targeted for iLO 5 1.20</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.3.0-0" date="1521633600">- v5.3.0 is mainly targeted for iLO 5 1.30</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.4.0-0" date="1532606400">- Changes include to select correct libssl.so file when multiple Openssl installed (32-bit and 64-bit)</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.4.0-0" date="1555416000">- Changes to remove the low level openSSL calls.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.5.0-0" date="1559217600">-Updated the OpenSSL API calls to support Host's OpenSSL FIPS mode.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.6.0-0" date="1590494400">- Changes to handle multiple OpenSSL library installed.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.7.0-0" date="1638532800">- Changes to support RHEL 9.0 OS.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.8.0-0" date="1658923200">- Changes to add dependency check for RPM installation.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 6.0.0-0" date="1659441600">- Changes to support iLO 6 or later.</changelog>
  </package>
  <package pkgid="b4441235e730c0907a6fb5fa7bbb6c3c69a19b6e01021d670f0c8ed9f62cbfbc" name="ice-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.11.14_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="aefb915c167389977dcb55b6e17b88a24d98c26ea57f8eaf993715508ea2b02e" name="ice-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.11.14_k5.3.18_57" rel="1.sles15sp3"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="51dc6d8533434f1070faca65cf85b610bc168966a39744853add5273067ea802" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.24.0_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Mohammad Sawalha &lt;mohammad@mellanox.com&gt;" date="1282737600">- Initial revision</changelog>
    <changelog author="Omer Dagan &lt;omerd@mellanox.com&gt;" date="1361188800">- Modified spec file to conform to KMP specifications</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1395230400">- Use one spec for KMP and non-KMP rpms.</changelog>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="1214f5309476a88c3cfadf8b3f542161227a5e5b7c1976b4728c370dbd4c3d4b" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.24.0_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="Mohammad Sawalha &lt;mohammad@mellanox.com&gt;" date="1282737600">- Initial revision</changelog>
    <changelog author="Omer Dagan &lt;omerd@mellanox.com&gt;" date="1361188800">- Modified spec file to conform to KMP specifications</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1395230400">- Use one spec for KMP and non-KMP rpms.</changelog>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="cfa4460c97b8e027b9760ab363e51e5424fddb54a8b3087ab904047ca150ae20" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.24.0_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="Mohammad Sawalha &lt;mohammad@mellanox.com&gt;" date="1282737600">- Initial revision</changelog>
    <changelog author="Omer Dagan &lt;omerd@mellanox.com&gt;" date="1361188800">- Modified spec file to conform to KMP specifications</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1395230400">- Use one spec for KMP and non-KMP rpms.</changelog>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="5dec7bb28fdbaa7ba7e9e799930bf625b9ae3930240f61ebd8e70d745b27628e" name="kmod-be2iscsi" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u8"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="139c035e692930d68421b1c19e31a895af5dc5b0d27a3ce35bb2cb23342aea1d" name="kmod-be2iscsi" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u9"/>
    <changelog author="scm_be &lt;scm_be@emulex.com&gt; 10.2.323.6" date="1403179200">- Added RHEL 7 support
- Added support for OCe14000 based adapters: 650FLB, 650M, 556FLR-SFP, CN1200E</changelog>
  </package>
  <package pkgid="93769c52914c3ffb9856e77506ad597082410aa2831e7f0f2f353167966780ed" name="kmod-be2net" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u8"/>
  </package>
  <package pkgid="936a1235853ea75ce165a9a6dea83dd2bd70411217e0680f3cfcdb1732e035cd" name="kmod-be2net" arch="x86_64">
    <version epoch="0" ver="12.0.1342.0" rel="1.rhel7u9"/>
  </package>
  <package pkgid="01b1510e8fd5408f826e213ccc979b55682a8dc56afb563e4561f3ae3b0c1648" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="226.0.141.0.5.14.0.70.22.1.rhel9u0"/>
  </package>
  <package pkgid="38e3ad1ad9e5f65f9f67b9d97c670b3256126a51d0033167060cc93a6365943b" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="226.0.141.0.rhel8u6"/>
  </package>
  <package pkgid="945ec02d3b47debb37ab919329d623a2d73ee2e7d85e4a30d1836ec63b6c5810" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="226.0.141.0.rhel8u7"/>
  </package>
  <package pkgid="a452a0ce8c1ec7c658a8f7108d279bdb6aaa21c9442a3a7d75b8d4187ce8c44c" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="226.0.141.0.rhel9u1"/>
  </package>
  <package pkgid="bf0736136ab21fbdb9a86bc4d9842f3e9e2a286ac34827a895a594ddb06e0b70" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.2.589.5" rel="1.rhel8u7"/>
    <changelog author="Broadcom Automated Build User&#13;" date="1630324800">- Changed version to 14.0&#13;
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1634126400">- Added support for RHEL 8U5&#13;
- Removed support for RHEL 7U5&#13;
- Removed support for RHEL 7U6&#13;
- Removed support for RHEL 7U7&#13;
- Removed support for RHEL 7U8&#13;
- Removed support for RHEL 8U1&#13;
- Removed support for RHEL 8U2&#13;
- Removed support for RHEL 8U3&#13;
- Removed support for SLES 15 SP1&#13;
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1645012800">- Changed version to 14.2&#13;
- Added support for RHEL 8U6&#13;
- Added support for RHEL 9U0&#13;
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1684497600">- Added support for ALP SP0</changelog>
  </package>
  <package pkgid="e49cad35c95bb3069d2776d4bed2d021f821ad041d534f4a2a791c76af9bde32" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.2.589.5" rel="1.rhel8u8"/>
    <changelog author="Broadcom Automated Build User&#13;" date="1630324800">- Changed version to 14.0&#13;
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1634126400">- Added support for RHEL 8U5&#13;
- Removed support for RHEL 7U5&#13;
- Removed support for RHEL 7U6&#13;
- Removed support for RHEL 7U7&#13;
- Removed support for RHEL 7U8&#13;
- Removed support for RHEL 8U1&#13;
- Removed support for RHEL 8U2&#13;
- Removed support for RHEL 8U3&#13;
- Removed support for SLES 15 SP1&#13;
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1645012800">- Changed version to 14.2&#13;
- Added support for RHEL 8U6&#13;
- Added support for RHEL 9U0&#13;
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1684497600">- Added support for ALP SP0</changelog>
  </package>
  <package pkgid="7525ff2e1b40817d0965c07c0dbf76d919f801f78edc64b2bf38395ee1565b34" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.2.589.5" rel="1.rhel9u1"/>
    <changelog author="Broadcom Automated Build User" date="1630324800">- Changed version to 14.0
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User" date="1634126400">- Added support for RHEL 8U5
- Removed support for RHEL 7U5
- Removed support for RHEL 7U6
- Removed support for RHEL 7U7
- Removed support for RHEL 7U8
- Removed support for RHEL 8U1
- Removed support for RHEL 8U2
- Removed support for RHEL 8U3
- Removed support for SLES 15 SP1
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User" date="1645012800">- Changed version to 14.2
- Added support for RHEL 8U6
- Added support for RHEL 9U0
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1684497600">- Added support for ALP SP0</changelog>
  </package>
  <package pkgid="8d90d7452ff70ce21fa28b713254f3b1723c8a559c0d201725ebe9508a18a396" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.2.589.5" rel="1.rhel9u2"/>
    <changelog author="Broadcom Automated Build User" date="1630324800">- Changed version to 14.0
- Initial build</changelog>
    <changelog author="Broadcom Automated Build User" date="1634126400">- Added support for RHEL 8U5
- Removed support for RHEL 7U5
- Removed support for RHEL 7U6
- Removed support for RHEL 7U7
- Removed support for RHEL 7U8
- Removed support for RHEL 8U1
- Removed support for RHEL 8U2
- Removed support for RHEL 8U3
- Removed support for SLES 15 SP1
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User" date="1645012800">- Changed version to 14.2
- Added support for RHEL 8U6
- Added support for RHEL 9U0
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1684497600">- Added support for ALP SP0</changelog>
  </package>
  <package pkgid="a2c63b2a80b8cf9ba213e4c3ac0948bbd7c79caea6223e33b962fdbbc27ebca8" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.22.18" rel="1.rhel8u5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.22.18-1.rhel8u5" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="3478da30b595bef0812eac9e53c85f5b7cfc78eecd4392a07ed9609fec0c293a" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.22.18" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.22.18-1.rhel8u6" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="7ad588b0c35754383b798c4b606c9dc92a545126022330881469715d810e7e83" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.22.18" rel="1.rhel8u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.22.18-1.rhel8u7" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="16a12cded6a18d4bcc31c63cec45b805006b94d7631d4848ad6504fe9cacc253" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.22.18" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.22.18-1.rhel9u0" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="be5d9cf9a2cda89c5a13680437fdafa914e1209542c9f405f49cdacce05b8dce" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.22.18" rel="1.rhel9u1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.22.18-1.rhel9u1" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="776fe8ce81c7d23e79034a7fe7ec74224d84781222f58f9fc4343addbbfcd054" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.8.2" rel="1.rhel8u5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="00f8a130db73346c83a2dfec331d23442f2bfaf6dee8d0fb0c4231c596e27247" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.8.2" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="822fbc03318773556b0b5c7258e6d9ffdc054146095dc259deed4ddc1ad60da0" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.8.2" rel="1.rhel8u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="db2dd5c6b1cddddeb3fa6f3bc0f7c69dcc4462f958a1ad9219bfa29f97c59cce" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.8.2" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="b2ff51783a39943d217fe1ccd6fb9419bcf169166fc76a7bd1dbce708de1eb27" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.8.2" rel="1.rhel9u1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="3f76b9b9ec2f7af893ef71a2f2a04316111123a75d54a8b7eb867f2a94cb4878" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="5.13.16" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="d4efb33628297cc474f837e8864645894f4fb5083038c6d9bc72652475dcf1f6" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="5.13.16" rel="1.rhel9u1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="0030fe33852dab246491129f7247f8cd359bf3c234e67f06372977b23509999f" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.13.16" rel="1.rhel8u5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="7a0caeb693c5ccfef4c7e133e020cab5ef83cba418d3709ccc5d3c4146b49fcf" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.13.16" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="1d3b5679da7971cc9bf18c13890fb1c0b7090c5399695cd3c099f31fa079794d" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.13.16" rel="1.rhel8u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="1fc830961312f5639e1ba99daa2b50ac5cec92021bf41303ca58bba80a89e315" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.18.11" rel="1.rhel8u5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="77dccb9f90ab96b85952b84fb754684fbcf44876217593955d111563590abbef" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.18.11" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="a43a23351c95dc7b8beef37f1a74a5d8e6d162a99bacdebfd645771547973e2b" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.18.11" rel="1.rhel8u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="ccc611cffe32fa1a6a26e7535e654da5dbb78c0c40538c9b4800e55e8dae58f3" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.18.11" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="4709ec6017f9c1791a2aa40937ae858cda9179c45862f4b2bf7d8b719f7d84bf" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.18.11" rel="1.rhel9u1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="108964a2132b8921412b9506e86edaab3d240fd9870e280c1160cc0e984e9d23" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.17.11" rel="1.rhel8u5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="187489cae80f37410211e37e174744e9115f17af3f959b91f23bb2c506f8130d" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.17.11" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="8ca42d4aeb65cfb9096b436a46b2ea109aa49f13b81b4905849c40d283396afc" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.17.11" rel="1.rhel8u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="7f8492628dd032a6d8061b1bc974963100e191305b4d2fbf8a3cd8a90280fbf5" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.17.11" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="8535211dcfd2703c901972c1ce146e54e1ef72704396c5f65e8129aad7c02277" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.17.11" rel="1.rhel9u1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="4cf47e132461c054045bf3b40907e668dd4418c8f955369759e3020232151205" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.11.14" rel="1.rhel8u5"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="19f8059a00aa184b189f44bc30c9c04c4dafc5fbc3df2c6fa61a83bdbd708e9a" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.11.14" rel="1.rhel8u6"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="ee1cf4aa5752dacb9d909d0ccd9c8a1af09414d5a33b84240a1d405c8f7e671e" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.11.14" rel="1.rhel8u7"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="4c284c27dfb7d1de6f7755ccf5f43c9e948a79280cb42dc2a35da78fc3b13936" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.11.14" rel="1.rhel9u0"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="dae6ae03899684991f2a21a53aa626c8a401a31eb8f803ddd3ed871235312c2e" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.11.14" rel="1.rhel9u1"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="2787fadcaf5e05cd40f59da48c5641a85e97cf5482848dd59e0544798e047569" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="1.rhel7u9"/>
    <changelog author="Mohammad Sawalha &lt;mohammad@mellanox.com&gt;" date="1282737600">- Initial revision</changelog>
    <changelog author="Omer Dagan &lt;omerd@mellanox.com&gt;" date="1361188800">- Modified spec file to conform to KMP specifications</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1395230400">- Use one spec for KMP and non-KMP rpms.</changelog>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="9131676fdd12e1e3427e1d0eaac4dfc8dcb854e23e2afc62c12fff4529c0d16f" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="1.rhel8u7"/>
    <changelog author="Mohammad Sawalha &lt;mohammad@mellanox.com&gt;" date="1282737600">- Initial revision</changelog>
    <changelog author="Omer Dagan &lt;omerd@mellanox.com&gt;" date="1361188800">- Modified spec file to conform to KMP specifications</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1395230400">- Use one spec for KMP and non-KMP rpms.</changelog>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="8a03bbd693b2d625901c3142a48ccbba6e06117811dfe48d2b9fd8f89b1f5b76" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="1.rhel8u8"/>
    <changelog author="Mohammad Sawalha &lt;mohammad@mellanox.com&gt;" date="1282737600">- Initial revision</changelog>
    <changelog author="Omer Dagan &lt;omerd@mellanox.com&gt;" date="1361188800">- Modified spec file to conform to KMP specifications</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1395230400">- Use one spec for KMP and non-KMP rpms.</changelog>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="96666b77f7937cbba910c86ae9fa03ef982e857c122d1d369f522000ab199f12" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="1.rhel9u1"/>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="a508e8a77dd4ae77f0357e09fd0037eff6a885e5e09e65ec64b73ce8a1938c9e" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="1.rhel9u2"/>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="9d60336cbc9789ebf827f4b32fb57d0f96181b01fd808b87ae6b61b39c92dead" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.722.02.00_rhel7u9" rel="1"/>
  </package>
  <package pkgid="b7193a228d481cef4b85309c2c11f65126872267e74207ca45e0836a4408402a" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.724.02.00_rhel8u5" rel="1"/>
  </package>
  <package pkgid="450c83d457da2381c3395f442a855e68c2b7f33a33f250852083565c4415293d" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.724.02.00_rhel8u6" rel="1"/>
  </package>
  <package pkgid="24a3d520949b771f032d36fb414676c555e330722da9039fe7960fdb87b7a9a3" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.724.02.00_rhel8u7" rel="1"/>
  </package>
  <package pkgid="0895f6642871c2187e6b1da12eb5b70a914c6515556a9e8c261624616a237957" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.724.02.00_rhel9u0" rel="1"/>
  </package>
  <package pkgid="1a9348e3c4024a61eefd8cf469f764ca7f08517d5242dbd73b946056a1025448" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.724.02.00_rhel9u1" rel="1"/>
  </package>
  <package pkgid="47625e08fa68b671c0f3bf57ae7ffc3faf20022518b9890199a7b6527e2ba651" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.202306080641.rhel8u7"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="72bd23ce2f5dfeead1fc6d54d342f4c1fbc3ac9b3f8d56e1b4bc68550b80699e" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.202306141336.rhel9u1"/>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="3b2ae559060150b5f912090f3713798ef50f0d367a7309ebb5a61efeb4eec907" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.rhel7u9"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="ac9d5c95b468318e18a663f8a97c3bd3e5e1b9e42ff9a7c81327c3991f1a4e0b" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.rhel8u8"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="1e0a6454a22dd6d1a4b87b977620a593149d7590a58f1c9fd7e8f13f82c36d53" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.rhel9u2"/>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="93d8e58de7d072dfa1b81bc20b60ee64efd99234eadbee8110a32e8bcaca84f9" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.17" rel="1.rhel8u7"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="46061c9c6751dd69ddf9c60b499ff37f421624d0d08893f3f8df891af458ec23" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.17" rel="1.rhel8u8"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="eca5de849adb43b116a0e75173c39ec10b5b095bf18d77002de745bdd379af84" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.17" rel="1.rhel9u1"/>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="6c75db12934fdf3d48f4409ab615493c769166376a425e681bdd9f102fb052e3" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.17" rel="1.rhel9u2"/>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="e833256e7a07158b89531dadafa967542999a0c102bdb32715c042f29aea6603" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.72.4.1" rel="1.rhel8u7"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="adfad75ad7e1f1cac4417b641264e0517abf98c60200e5d385c13b5a1830ac34" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.72.4.1" rel="1.rhel9u1"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="afae827542f3eb47c72bce6950fa77e476e420d35edd144a72e8a05cb58050dd" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.72.4.1" rel="2.rhel8u8"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="1d898443b12f3fae331110769d3e8a1d4efe4a4baf466a835fca6872b81c87e5" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.72.4.1" rel="2.rhel9u2"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="60eb60b9456f91659249894e4fb409be0946391e5ec15cea5dd56e366b8b883b" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.10.00_k1" rel="1.rhel8u7"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.10.00-k1-1" date="1686657600">- 10.02.10.00-k1 AE 06/13/2023
- 10.02.10.00.a2-k1 BH 05/12/2023
- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="4f6a2779eb9103bc562ecf1f74a5270a7df1b188dd3ada6aea3ead6ab619b5dd" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.10.00_k1" rel="1.rhel8u8"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.10.00-k1-1" date="1686657600">- 10.02.10.00-k1 AE 06/13/2023
- 10.02.10.00.a2-k1 BH 05/12/2023
- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="122e50a3dbe06bc1e184a04331c218c1bac0d0ab70a31fc3ae53966476001cdf" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.10.00_k1" rel="1.rhel9u1"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.10.00-k1-1" date="1686657600">- 10.02.10.00-k1 AE 06/13/2023
- 10.02.10.00.a2-k1 BH 05/12/2023
- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="5f8c4c1a0ab1214f02162659fe96934668f758310994cc531ccf98bc728d5d75" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.10.00_k1" rel="1.rhel9u2"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.10.00-k1-1" date="1686657600">- 10.02.10.00-k1 AE 06/13/2023
- 10.02.10.00.a2-k1 BH 05/12/2023
- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="fa606c2423aa04a124347cdf114623403fa2865af145fd582dee449a4d9d27b7" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.24" rel="046.rhel7u9"/>
  </package>
  <package pkgid="42094d8c4339dbe46a874e488077438dbd6964c04d6d6468bbf3ac25cb7a9a6b" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.24" rel="046.rhel8u6"/>
  </package>
  <package pkgid="c9274353210a77adb6210936a96ff7c43bcd6e5e3e8bc4adfcea406e6e66b576" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.24" rel="046.rhel8u7"/>
  </package>
  <package pkgid="a77a6e1916bd1856c6d16a9858e2b381a893a38b6ebca79156114d943b57c555" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.24" rel="046.rhel8u8"/>
  </package>
  <package pkgid="35b3eb9f720efa44a13667c3a05c81b3f30fa4f1a6c91458f9d472fdd9bb56df" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.24" rel="046.rhel9u0"/>
  </package>
  <package pkgid="61d58b9a66bbbf28be9ef050a6d356f4a3e04dd31e79482fc00bd95d0c6c0cc6" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.24" rel="046.rhel9u1"/>
  </package>
  <package pkgid="e6f692e090a2784b0a253ac100d5fb7e838568535581795cf416ba48029915f3" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.24" rel="046.rhel9u2"/>
  </package>
  <package pkgid="8b2740136673414ea6bb2725880d34600b5d76cb2bae14837b10679436530ba5" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139j" rel="1.5.14.0.70.22.1.rhel9u0"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="ff19053920ba401ed73c8d435088f2edcdc924725d84cdce9661a15029f66d83" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139j" rel="1.rhel8u6"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="3e38a7a65c8af1b4b3847357f0c7c0112dd2b6497ff6a3a31c74d242d2f006e8" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139j" rel="1.rhel8u7"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="558b1d7ed5826426dfa132d631c437a131eabd38b841f728087e73094aa44b51" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139j" rel="1.rhel9u1"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="2057fbb0679858c2313a08a42c248aaa97644a66a5ee23e9106e20b584aa65c1" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="226.0.141.0" rel="rhel8u7"/>
  </package>
  <package pkgid="241a6d09aa0b9b682b8ee42b235d21c895f12207b30f2ec249f4869acf9bc04d" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="226.0.141.0" rel="rhel9u1"/>
  </package>
  <package pkgid="dd96a108bac2a8bba7a8a201fdbb19a829a93cbab8e874a8a9f7031fe819553b" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="226.0.141.0" rel="sles12sp5"/>
  </package>
  <package pkgid="413361723430c35e9f0863728ac4ca95a50ee6f86eb07c4309dcae73ee1c8990" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="226.0.141.0" rel="sles15sp4"/>
  </package>
  <package pkgid="5825da68681af23d924e77a10a567e7d4801733e26191c6d00417b3cb239c32a" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.724.02.00_sles12sp5" rel="1"/>
  </package>
  <package pkgid="1f482a1d6c4cf66e46110065e0002f4b5f9032979a9101c2958e0d88f612e389" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.724.02.00_sles15sp4" rel="1"/>
  </package>
  <package pkgid="c56e2b4a4e18d73b778d5d2484f8bce2384405c97dd3d2699f4d530a9a015b02" name="mft" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="72.rhel7u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 4.24.0-72.rhel7u9</changelog>
  </package>
  <package pkgid="7f77cb06569ddb12281e37b20ac2ae919745620f00d87eee1b3fcc25b51f053b" name="mft" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="72.rhel8u7"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 4.24.0-72.rhel8u7</changelog>
  </package>
  <package pkgid="266b2564b68ece585c07699afd3e6392338a593a057b6e087d4c7bd9bc5a7a86" name="mft" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="72.rhel8u8"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 4.24.0-72.rhel8u8</changelog>
  </package>
  <package pkgid="8fe312f8a6819e4dbef61ab7d49c76c9d0c94053b79eed43d962decbb56d82f0" name="mft" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="72.rhel9u1"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 4.24.0-72.rhel9u1</changelog>
  </package>
  <package pkgid="94a5267419dac2c426bd1d44072ed99e08063deefbf4b3a53d5e97bebcf535d4" name="mft" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="72.rhel9u2"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 4.24.0-72.rhel9u2</changelog>
  </package>
  <package pkgid="86ba0ffdd0d6fe560928601584d02b642f5eaba5f369c61cc12c828cbf6233d9" name="mft" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="72.sles12sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 4.24.0-72.sles12sp5</changelog>
  </package>
  <package pkgid="55b19aa136f1b83c34e60eda180d9ba20634ec6bea4ed31df765c687941f2869" name="mft" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="72.sles15sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 4.24.0-72.sles15sp4</changelog>
  </package>
  <package pkgid="bb60debf40f9e2c35772eca4857e3696eb9e078e2adb455bf114211f2d7fe54b" name="mft" arch="x86_64">
    <version epoch="0" ver="4.24.0" rel="72.sles15sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 4.24.0-72.sles15sp5</changelog>
  </package>
  <package pkgid="b3f0e9d8b51a379c6e24f1ecb0dd828894d16f60b731808c47e3000d0efbb384" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.rhel7u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 23.04-OFED.23.04.1.1.3.1.rhel7u9</changelog>
  </package>
  <package pkgid="368c687e1df08e158fea3617b6be4ea4535225362fd696d6991ad8cc7e38c27d" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.rhel8u7"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 23.04-OFED.23.04.1.1.3.1.rhel8u7</changelog>
  </package>
  <package pkgid="31a9e41178d64f8960b7f52270e3c09fe8222908d41d6a61cbdd7c5d073ade10" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.rhel8u8"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 23.04-OFED.23.04.1.1.3.1.rhel8u8</changelog>
  </package>
  <package pkgid="32c7995a53befa56ad015781191b1d62423e9801accefe08d5305163d4fa3d6a" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.rhel9u1"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 23.04-OFED.23.04.1.1.3.1.rhel9u1</changelog>
  </package>
  <package pkgid="b9d755d6eff968b2b73dd9bd5eda62c13d1f85a8224af745fe903155c5633e41" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.rhel9u2"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 23.04-OFED.23.04.1.1.3.1.rhel9u2</changelog>
  </package>
  <package pkgid="2d30b1a86512e60daca7202eb4f823dae949c314a4d12e1c9abcfb715da46062" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.sles12sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 23.04-OFED.23.04.1.1.3.1.sles12sp5</changelog>
  </package>
  <package pkgid="9c791eec7eb515b57cc7afd5c307bf282f361458f4711fba161fa1fe083c5b1c" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.sles15sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 23.04-OFED.23.04.1.1.3.1.sles15sp4</changelog>
  </package>
  <package pkgid="943fd90f0d6e10b70e073d221e0c11d0810e702f8e8bc20aad484d5d524831e7" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.04" rel="OFED.23.04.1.1.3.1.sles15sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1685448000">- Release version 23.04-OFED.23.04.1.1.3.1.sles15sp5</changelog>
  </package>
  <package pkgid="bebcd8f31a6d0bd3356dec4158e24b0212d5a0149c922dfcd1dff2178213257a" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="23.04_k4.12.14_120" rel="OFED.23.04.1.1.3.1.sles12sp5"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="a5878754ea45fa0f8ac908acd2299a76682e4513fefe2c74e525db3f97cdbc4b" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="23.04_k5.14.21_150400.22" rel="OFED.23.04.1.1.3.1.sles15sp4"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="78dca1ce764e0703aef83c6227b98a41a72a173915348021a58e1469c06c8b2b" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="23.04_k5.14.21_150500.53" rel="OFED.23.04.1.1.3.1.sles15sp5"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="3d806d0f2555c86e926d0396c09977f6ecba9d3daee038413c5ec5890202b469" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.15.17_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="a28ab33e17514d6669a0e4ff537182730872c80cf5a4cb128bc8f95ee8bfdf46" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.15.17_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="9e74fd5451c3fbae4ba629d8e3eead7497b4e001317495c557ac1c073dc07f54" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.15.17_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="e1227c05276d344c881fddf8fa02b661c78e83ff18267360a36b096feeca9472" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.72.4.1_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="f3ecba6f1b343ef7df514c6cb8d0907214ee09042115c29d3e1ef8f3f3e12376" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.72.4.1_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="dced1fbda20aa111d58d98d87c554244866ce18a8009b38997160216129d441e" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.72.4.1_k5.14.21_150500.53" rel="8.sles15sp5"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="26c9d0ac8569ca22f9e90d19619a262a8a62fe452c6f556873ddd300fe4a6ec1" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.02.10.00_k1_k4.12.14_120" rel="1.sles12sp5"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.10.00-k1-1" date="1686657600">- 10.02.10.00-k1 AE 06/13/2023
- 10.02.10.00.a2-k1 BH 05/12/2023
- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="c431a600cc1f63fc293d69d317e2f1ebd2fc03e6dcc3aa72c825545029ee16ab" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.02.10.00_k1_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.10.00-k1-1" date="1686657600">- 10.02.10.00-k1 AE 06/13/2023
- 10.02.10.00.a2-k1 BH 05/12/2023
- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="417f1c578b971bf758afd9332c14825b648044f138d0a13f9696f9d5ad642121" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.02.10.00_k1_k5.14.21_150500.53" rel="2.sles15sp5"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.10.00-k1-2" date="1687089600">- 10.02.10.00-k1 AE 06/13/2023
- 10.02.10.00.a2-k1 BH 05/12/2023
- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="b31d7d49cb1c4a3ff727aacde68beb648d065883af1d7a042f7e37f3c21d40a1" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.24" rel="046.sles12sp5"/>
  </package>
  <package pkgid="d7c589c11ab67ab2737120a6d317f979ebd28f7f4851e43cc2bbd17427f6e9bd" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.24" rel="046.sles15sp4"/>
  </package>
  <package pkgid="8dbf3fdd424b3d7182cc04cdf11b908c6d04faad7e63979d4e87eeac7cb0adae" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.24" rel="046.sles15sp5"/>
  </package>
  <package pkgid="22242b44d2bfba683ed5a69d846fcefa13476936b80497c2988085a5b936fee3" name="ssa" arch="x86_64">
    <version epoch="0" ver="6.25" rel="9.0"/>
    <changelog author="Ver:6.25-9.0" date="1687176000">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="a1fc01e7d00789b345cf649a58461030d658dda706e105db13809e1e75b566a9" name="ssacli" arch="x86_64">
    <version epoch="0" ver="6.25" rel="9.0"/>
    <changelog author="Ver:6.25-9.0" date="1687176000">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="47e5da176683b127c0c4b96e0291fcfcf178d3a81efabb4129de20cd6eda8a7e" name="ssaducli" arch="x86_64">
    <version epoch="0" ver="6.25" rel="9.0"/>
    <changelog author="Ver:6.25-9.0" date="1687176000">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="271de2c2cdaad748b8b97ef74c7addba32c071320f0829a1aea4758bd4fbbbea" name="storcli" arch="noarch">
    <version epoch="0" ver="007.2417.0000.0000" rel="1"/>
  </package>
  <package pkgid="0f6acb67cdfd27b4fb2d6dcfeb82f4608226f0d6610147fdeb112b3777a54d8d" name="sut" arch="x86_64">
    <version epoch="0" ver="4.5.0" rel="20.linux"/>
  </package>
  <package pkgid="91dd78c992b0f8eb015af3507101997c68662ad155fb8d090ff028d243b152f4" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.139j_k4.12.14_120" rel="2.sles12sp5"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="7fbf4480a8201f68ac0d5ac50491d12b0a316b424b5f6307873a1a3ec7b5b8a5" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.139j_k5.14.21_150400.22" rel="2.sles15sp4"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="bb331ee5a47c31229aeabfd1eb52782dc331e0024cb009c7ad9ac59e45c619c9" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.139j_k5.3.18_57" rel="2.sles15sp3"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
</otherdata>
</manifest>
