<?xml version='1.0' encoding='UTF-8'?>
<manifest schema_version="2.0.0.0">
  <otherdata xmlns="http://linux.duke.edu/metadata/other" packages="339">
  <package pkgid="c67d064472013da6cf7bd886dcd5b5df11fe2e87544e73591219f816b267655d" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="14.2.589.11" rel="1.rhel8"/>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658750400">- Changed version to 14.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1664193600">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1664280000">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152000">- Changed version to 14.3
- Updated libdfc library
- Updated libemsdm library
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152001">- Added support for ALP 1 SP0</changelog>
    <changelog author="Broadcom Automated Build User" date="1689595200">- Added support for RHEL 9U3
- Added support for RHEL 8U9</changelog>
  </package>
  <package pkgid="0a118f2d7a97fc3166507a6c46d480d8e8228cb070dd2185c528b4bf851c8807" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="14.2.589.11" rel="1.sles15sp4"/>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658750400">- Changed version to 14.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1664193600">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1664280000">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152000">- Changed version to 14.3
- Updated libdfc library
- Updated libemsdm library
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152001">- Added support for ALP 1 SP0</changelog>
    <changelog author="Broadcom Automated Build User" date="1689595200">- Added support for RHEL 9U3
- Added support for RHEL 8U9</changelog>
  </package>
  <package pkgid="c4058ca2dbb45d97cf3ec0c748d866903c15cde4ccbbd9147f6d483f3b962d72" name="HPE-CNA-FC-Emulex-Enablement-Kit" arch="x86_64">
    <version epoch="0" ver="14.2.589.11" rel="1.sles15sp5"/>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658750400">- Changed version to 14.2
- Updated libdfc library 
- Updated libemsdm library 
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1664193600">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1664280000">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152000">- Changed version to 14.3
- Updated libdfc library
- Updated libemsdm library
- Updated libemulexhbaapi library</changelog>
    <changelog author="Broadcom Automated Build User" date="1684152001">- Added support for ALP 1 SP0</changelog>
    <changelog author="Broadcom Automated Build User" date="1689595200">- Added support for RHEL 9U3
- Added support for RHEL 8U9</changelog>
  </package>
  <package pkgid="12922c148afe88fb1c6a4dcc42e7a02e3b9090209152ba518c61649bf929d585" name="HPE-CNA-FC-hpeqlgc-Enablement-Kit" arch="noarch">
    <version epoch="0" ver="6.0.0.1" rel="3"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1587729600">Enablement Kit Version: 6.0.0.0-13
----------------------------------

v6.04 build55:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added MPI Firmware Dump support
Introduced: v6.04 build55
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build54:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Secure remote port info support
Introduced: v6.04 build54
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build53:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Check driver for SCM stats support before reading SCM stats
Introduced: v6.04 build53
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1592481600">Enablement Kit Version: 6.0.0.0-14
----------------------------------

v6.04 build56:
-------------

Defect/Enhancement: Defect
Problem: LUN QoS API returns "Not Supported"
Solution: Fixed QoS value read issue in BSG path
Introduced: v6.04 build21
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61, ISP2031
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt;" date="1593086400">Enablement Kit Version: 6.0.0.0-15
----------------------------------

v6.04 build57:
-------------

Defect/Enhancement: Defect
Problem: Delay seen in Application bringup on some inbox drivers
Solution: Do not perform retries for newer features if driver returns
	  not supported error
Introduced: v6.04 build28
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1599825600">Enablement Kit Version: 6.0.0.0-16
----------------------------------

v6.04 build63:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Allow NVMe specific APIs for newer ISPs
Introduced: v6.04 build63
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271,
	    ISP2261, ISP2871, ISP2971, ISP2A61
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build62:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added ISP FW and MPI FW lockdown bits
Introduced: v6.04 build62
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build61:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Provide lockdown mode error codes to apps
Introduced: v6.04 build61
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build60:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added adapter firmware lockdown support
Introduced: v6.04 build60
Impact: HW: ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build59:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added EP2989 support
Introduced: v6.04 build59
Impact: HW: EP2989
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build58:
-------------
Defect/Enhancement: Defect
Problem: HBA Parameters read fails for newer adapters for inbox drivers
Solution: Read active HBA Parameters region set from flash
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1627905600">Enablement Kit Version: 6.0.0.0-17
----------------------------------

v6.04 build75:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Mailbox passthru support
Introduced: v6.04 build75
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build74:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added NVRAM parameters for SCMR Profile support
Introduced: v6.04 build74
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build73:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added SCMR Profile support
Introduced: v6.04 build73
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build72:
-------------
Defect/Enhancement: Defect
Problem: Random apps crash seen when large number of vports present
Solution: Validate vport memory pointers before accessing it
Introduced: v6.04 build24
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build71:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added EP2881 and EP2981 support
Introduced: v6.04 build71
Impact: HW: EP2881, EP2981
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build70:
-------------
Defect/Enhancement: Defect
Problem: Flash update failure on UOS on ARM (aarch64)
Solution: Corrected BSG pointers for UOS on ARM
Introduced: v6.04 build24
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build69:
-------------
Defect/Enhancement: Defect
Problem: Invalid LUN size display for small sized (In MBs) and large sized
	 (in TBs) NVMe LUNs
Solution: Use correct read capacity format to get LUN size of NVMe LUNs
Introduced: v6.04 build52
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build68:
-------------
Defect/Enhancement: Defect
Problem: Apps delay seen with NVMe targets
Solution: Cache common NVMe target data to avoid multiple calls to NVMe targets
Introduced: v6.04 build52
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build67:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Session shutdown state macro support
Introduced: v6.04 build67
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build66:
-------------
Defect/Enhancement: Defect
Problem: Apps crash seen with HBA_RemoveCallback SNIA API
Solution: Avoid double free of memory freed in HBA_RemoveCallback SNIA API
Introduced: Day One
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build65:
-------------
Defect/Enhancement: Defect
Problem: Apps delay seen with disabled/isolated port
Solution: Avoid apps retries for disabled/isolated port
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build64:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added USCM Phase 2 support
Introduced: v6.04 build64
Impact: HW: ISP2071, ISP2261, ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Defect
Problem: Apps crash seen with disabled/isolated port
Solution: Fixed apps crash with disabled/isolated port
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1644580800">Enablement Kit Version: 6.0.0.0-18
----------------------------------

v6.04 build81:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added NVRAM parameters for UEFI boot support
Introduced: v6.04 build81
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build80:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added additional USCM statistics info
Introduced: v6.04 build80
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build79:
-------------
Defect/Enhancement: Defect
Problem: Port reset seen on all ports of the adapter after HBA parameter update
Solution: Allowed reset only in HBA parameter modified port
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build78:
-------------
Defect/Enhancement: Defect
Problem: Apps crash seen with DPort test with newer firmware
Solution: Increase response buffer size to read extra data provided by FW
Introduced: v6.04 build24
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289 ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build77:
-------------
Defect/Enhancement: Defect
Problem: NPIV port seen as physical port on newer OSes
Solution: Corrected host number list
Introduced: v6.04 build24
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build76:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added FC-GS-8 based speed definitions
Introduced: v6.04 build76
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1673611200">Enablement Kit Version: 6.0.0.0-19
----------------------------------

v6.05 build7:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Use 32bit buffer size of SFP FW update
Introduced: v6.05 build7
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build6:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added 64G FC SFP FW update support
Introduced: v6.05 build6
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build5:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Remote Port API support
Introduced: v6.05 build5
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build4:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Secure Port V2 API support
Introduced: v6.05 build4
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build3:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Klocwork static analysis fixes
Introduced: v6.05 build3
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build2:
-------------
Defect/Enhancement: Defect
Problem: Feature API confilct seen FOAPI
Solution: Removed conflicting duplicate feature APIs
Introduced: v6.05 build1
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.05 build1:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Klocwork static analysis fixes
Introduced: v6.05 build1
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build90:
-------------
Defect/Enhancement: Defect
Problem: Incorrect NVMe portID seen when multiple targets present
Solution: Provide valid PortIDs for NVMe targets
Introduced: v6.04 build85
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build89:
-------------
Defect/Enhancement: Defect
Problem: Incorrect secure target fields seen
Solution: Provide valid info for secure targets
Introduced: v6.04 build54
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build88:
-------------
Defect/Enhancement: Defect
Problem: NVRAM dat file update failure on 8G adapter
Solution: Fixed dat file update on 8G adapter
Introduced: v6.04 build2
Impact: HW: ISP2532
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build87:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Uncorrectable FEC error count support in USCM stats 
Introduced: v6.04 build87
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build86:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added I/O Throttling support
Introduced: v6.04 build86
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build85:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added PortID support for NVMe targets
Introduced: v6.04 build85
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289, ISP2071, ISP2271, ISP2261
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build84:
-------------
Defect/Enhancement: Defect
Problem: Boot code valid bit is set for all boot codes
Solution: Set boot code valid bit only when valid boot code is found
Introduced: v6.04 build1
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build83:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Virtual Lane support
Introduced: v6.04 build83
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC

v6.04 build82:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added new NVRAM parameters
Introduced: v6.04 build82
Impact: HW: ISP2081, ISP2281, ISP2089, ISP2289
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1680609600">Enablement Kit Version: 6.0.0.1-1
----------------------------------

v7.00 build1:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Use OS provided libsysfs library
Introduced: v7.00 build1
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added Klocwork static analysis fixes
Introduced: v7.00 build1
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1683633600">Enablement Kit Version: 6.0.0.1-2
----------------------------------

v7.00 build3:
-------------
Defect/Enhancement: Defect
Problem: Apps issue seen with static library
Solution: Fixed static library issue
Introduced: v7.00 build2
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v7.00 build2:
-------------
Defect/Enhancement: Defect
Problem: Apps runtime failure on RHEL 9 due to libsysfs function
Solution: Removed dependency of libsysfs function
Introduced: v7.00 build1
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC</changelog>
    <changelog author="Marvell Semiconductor Inc." date="1691150400">Enablement Kit Version: 6.0.0.1-3
----------------------------------

v7.00 build6:
-------------
Defect/Enhancement: Defect
Problem: checksec.sh reported security property issues
Solution: Fixed checksec.sh reported security property issues
Introduced: Day One
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v7.00 build5:
-------------
Defect/Enhancement: Enhancement
Problem: N/A
Solution: Added driver maintenamce mode support for FW load error
Introduced: v7.00 build5
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC

v7.00 build4:
-------------
Defect/Enhancement: Defect
Problem: Debug symbols present in library binary
Solution: Removed debug symbols from library binary
Introduced: Day One
Impact: HW: All adapters
	OS: All supported Linux flavors
	Protocol: FC</changelog>
  </package>
  <package pkgid="d4632ce150a1d9dea657f9f58a4d661d175848746b71e5aa1b1c4cb7ed5a0e6c" name="MRStorageAdministrator" arch="x86_64">
    <version epoch="0" ver="008.006.018.000" rel="00"/>
  </package>
  <package pkgid="3ec5b94de5938533405c72b76f1f02813c498f72e7c9f0e10026446c31505760" name="amsd" arch="x86_64">
    <version epoch="0" ver="3.5.0" rel="1803.25.rhel8"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.5.0-1803.25.rhel8" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="f4cfc9c52cf17ee067f479361e58d771bf955529596607c17fd38231f8c46e1b" name="amsd" arch="x86_64">
    <version epoch="0" ver="3.5.0" rel="1803.47.sles15"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.5.0-1803.47.sles15" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="d9516356a3e1397354c0997c644742387d2cbf425b36b2c71201b20dc16ac30c" name="amsd" arch="x86_64">
    <version epoch="0" ver="3.5.0" rel="1803.58.rhel9"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.5.0-1803.58.rhel9" date="1280318400">- ENHANCEMENTS</changelog>
  </package>
  <package pkgid="77ee7f2174f42999b59a32d21567c645391ac94635f8eec0e5b04fc84a7f8995" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.2_k5.14.21_150400.22" rel="228.0.133.0.sles15sp4"/>
  </package>
  <package pkgid="91f08aa8ec497cbb462f28c047465feb4dd284efe97d9f5f64374975bc40ad38" name="bnxt_en-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.10.2_k5.14.21_150500.53" rel="228.0.133.0.sles15sp5"/>
  </package>
  <package pkgid="f80559e32f7d36b12c873f1513392186161f020f9eeb01a17975908d68f4082b" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="14.2.589.21_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="Broadcom Automated Build User" date="1634126400">- Added support for RHEL 8U5
- Removed support for RHEL 7U5
- Removed support for RHEL 7U6
- Removed support for RHEL 7U7
- Removed support for RHEL 7U8
- Removed support for RHEL 8U1
- Removed support for RHEL 8U2
- Removed support for RHEL 8U3
- Removed support for SLES 15 SP1
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User" date="1645012800">- Changed version to 14.2
- Added support for RHEL 8U6
- Added support for RHEL 9U0
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1684497600">- Added support for ALP SP0</changelog>
    <changelog author="Broadcom Automated Build User" date="1688731200">- Added support for RHEL 9U3
- Added support for RHEL 8U9</changelog>
  </package>
  <package pkgid="5065d1b93efa7cbd38797602fd4ce09ebff35fae424a510b50cf5393c02e3b66" name="elx-lpfc-kmp-default" arch="x86_64">
    <version epoch="0" ver="14.2.589.21_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="Broadcom Automated Build User" date="1634126400">- Added support for RHEL 8U5
- Removed support for RHEL 7U5
- Removed support for RHEL 7U6
- Removed support for RHEL 7U7
- Removed support for RHEL 7U8
- Removed support for RHEL 8U1
- Removed support for RHEL 8U2
- Removed support for RHEL 8U3
- Removed support for SLES 15 SP1
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User" date="1645012800">- Changed version to 14.2
- Added support for RHEL 8U6
- Added support for RHEL 9U0
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1684497600">- Added support for ALP SP0</changelog>
    <changelog author="Broadcom Automated Build User" date="1688731200">- Added support for RHEL 9U3
- Added support for RHEL 8U9</changelog>
  </package>
  <package pkgid="56750e4b3ab8c9b03d4cfb1718e3087e094ea7b923b190dbf6c31ba361907515" name="fibreutils" arch="x86_64">
    <version epoch="0" ver="4.2" rel="1_rhel"/>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-3" date="1260446400">- Fixed discovery of HBAs in adapter_info on Integrity servers with multiple PCI
  busses</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-3" date="1298635200">- Initial release with Emulex CNA support</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-4" date="1323345600">- Fix for dependency check error seen when installing with HPSUM</changelog>
    <changelog author="Kumar Rahul&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-5" date="1329220800">- Removed installation check for kernel 2.6 and addded Installation check for Rhel5.3 and SLES10 SP3 onwards</changelog>
    <changelog author="Shreya Roy Chowdhury&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-6" date="1355832000">- Corrected Link state display information for Qlogic Adapters
- Added MSA G3 support in Scsi_info.h</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 3.3-6" date="1557316800">-Perl dependancy fix for RHEL8</changelog>
    <changelog author="Ratna Dey&lt;rathna.dey@hpe.com&gt; and Aravinda Rajanna &lt;aravinda.rajanna@hpe.com&gt; 4.1-1" date="1561550400">-Initial support added for E4 and will get updated subsequently</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1563451200">-Fixed adpater_info code to display correct Vendor name instead of Unknown</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1564056000">-Removed Brocade HBAs support</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.2-1" date="1630584000">-Removed adapter_info_nx code for E4 adapters</changelog>
  </package>
  <package pkgid="59d5503417199421eeab0099b0964420fb12c5163be1a0d4e2090f98fa2018d5" name="fibreutils" arch="x86_64">
    <version epoch="0" ver="4.2" rel="1_sles"/>
    <changelog author="Chad Dupuis &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.1-3" date="1260446400">- Fixed discovery of HBAs in adapter_info on Integrity servers with multiple PCI
  busses</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-3" date="1298635200">- Initial release with Emulex CNA support</changelog>
    <changelog author="Keith Wortman &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-4" date="1323345600">- Fix for dependency check error seen when installing with HPSUM</changelog>
    <changelog author="Kumar Rahul&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-5" date="1329220800">- Removed installation check for kernel 2.6 and addded Installation check for Rhel5.3 and SLES10 SP3 onwards</changelog>
    <changelog author="Shreya Roy Chowdhury&lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.2-6" date="1355832000">- Corrected Link state display information for Qlogic Adapters
- Added MSA G3 support in Scsi_info.h</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 3.3-6" date="1557316800">-Separated code stream for RHEL and SLES</changelog>
    <changelog author="Ratna Dey&lt;rathna.dey@hpe.com&gt; and Aravinda Rajanna &lt;aravinda.rajanna@hpe.com&gt; 4.1-1" date="1561550400">-Initial support added for E4 and will get updated subsequently</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1563451200">-Fixed adpater_info code to display correct Vendor name instead of Unknown</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.1-1" date="1564056000">-Removed Brocade HBAs support</changelog>
    <changelog author="Ratna Dey &lt;rathna.dey@hpe.com&gt; 4.2-1" date="1630584000">-Removed adapter_info_nx code for E4 adapters</changelog>
  </package>
  <package pkgid="a21c7022fd5cb40a6936d860bf872ef2f9091d3b5896893b1fdb96f07aaf39bc" name="firmware-d3000" arch="x86_64">
    <version epoch="0" ver="5.04" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04-2.1" date="1534852800">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v155369/D3000_P07231-002.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.04-3.1" date="1540209600">-     *The following fix was incorporated in this version:**
    
      *  Fixed NVRAM CRC error
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v157942/P07231-003.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4.12" date="1551700800">-     *The following fixes were incorporated in this version:**
    
      * Fixed TLB exception during upgrade from Rev build 1.11.000 to 0412.000
    
      * Fixed expander bootstrap task which failed with 0xB1 error code appearing in the console due to missing NVRAM tag - Product Name
    
      * Enabled-ClusterS2D command that does not complete with SATA drive in D3610
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v154196/D3000_P07231-004.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v177052/D3000_P07231-006.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-2.1" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-2.1" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v191363/D3000_v5.04B.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-3.1" date="1636977600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-3.1" date="1637064000">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v202692/20-D3000-Gen10RN504C_ED3.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.04-8.1" date="1708689600">-     *The following fixes were incorporated in this version:**
    
      * The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.
    
      * The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.
    
      * Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.
    
      * If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p879663226/v234600/20-D3000-Gen10RN504G_ED7.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="494fb1d3d619d16d0cef2cdf856d05ba7fc34ce75d9ac6df0e0365f4c862d9ad" name="firmware-d3000" arch="x86_64">
    <version epoch="0" ver="6.00" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.00-2.1" date="1708689600">-     *The following fixes were incorporated in this version:**
    
      * Code optimization to save memory repo.
    
      * TLB exception seen while doing esp reset when expander reset was in progress.
    
      * Added the psoc 8.93 binary in peripheral images, updated the reveille version numbers.
    
      * Added whole new Delta PS-pmbus code , Updated the ESP version number.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1808229885/v234599/20-D3000B-Gen10RN600A_ED2.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="aa038ba69fb703c9ac664b75010fc35e22c7c5bc293b971103cbe34b5caee873" name="firmware-d6020" arch="x86_64">
    <version epoch="0" ver="2.74" rel="15.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-4.1" date="1572955200">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v172139/D6020_P07232-006.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-5.1" date="1586347200">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 8</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-5.1" date="1586433600">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v177006/D6020_v274_RN.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-7.1" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-7.1" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v183133/D6020_P07232-008.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-9.1" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-9.1" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v191364/D6020_v2.74I.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-10.1" date="1636977600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-10.1" date="1637064000">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v202690/20-D6020-Gen10RN274J_ED8.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.74-15.1" date="1708689600">-     *The following fixes were incorporated in this version:**
    
      * Temperature sensors logic inside gSEP model and SES database
      * When an IOM is pulled the surviving IOM reports false critical temperatures
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p1194926978/v234598/20-D6020-Gen10RN274N_ED12.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="42fff26cb072528d5e5906f76ea3f719ced99e505158f8d1f050615de9b0f7ec" name="firmware-d8000" arch="x86_64">
    <version epoch="0" ver="0130" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0105" date="1572955200">-     *The following fixes were incorporated in this version:**
    
      * SAS drive LED behavior was corrected to align with the Smart Array specification, specifically: 
        * The Activity LED of a sanitize erase drive now turns ON when connected.
    
        * The Array present LED now turns ON for the SAS drive.
    
        * The Activity LED now blinks on all drives during a SAS drive rebuild.
    
      * The Serial Output Buffer (SOB) has a fixed sized for stored entries. Now, when the buffer is full, the oldest entries are cleared or committed to persistent storage (if available). For this reason, subsequent requests to read the SOB only retrieves new entries that have been logged since the last successful request to read the SOB.
    
      * The drive activity LED has been changed to a function as described in the installation and maintenance guide.
    
      * The reboot flag was changed to issue a hard reset, which enables the service delivery subsystem (ZPSDS) information be shared across (expanded across) the internal expanders to all devices attached.
    
      * The drive activity LED on the SAS disk drives was changed to support the ACTIVE_LOW signal state. The ACTIVE_LOW signal state is the default operation state for most drives.
    
      * The SCSI WRITE BUFFER MODE was changed from activate to soft reset. This change improves the host ability to detect and report whether the enclosure is going to perform a disruptive or non-disruptive activation after a firmware upgrade.
    
      * With I/O module firmware v0105 and PQI firmware 2.02 , the slot power cycle issue has been resolved by changing the power cycle SES request to return a failure when a partner slot is not connected.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v172138/D8000_P20366-002.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0107" date="1601985600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0107" date="1602072000">-     *The following fixes were incorporated in this version:**
    
      * In STD INQUIRY RESPONSE, the ErrM bit was always being set. The ErrM bit indicates that the enclosure firmware detects a mismatch in any of its package versions and the firmware version of a FRU component. The issue was due to an incorrect version of PSU firmware being included and that has been fixed.
    
      * After installing the latest firmware on the enclosure I/O modules, the SES targets could not be discovered on the host. The virtual phy bit in SMP DISCOVER RESPONSE, which is used by the Microchip smartpqi HBA, was det for the virtual phy of the I/O module.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v183134/D8000_P20366-004.html) for the complete listing of
    fixes, enhancements, known issues and work-arounds corresponding to this
    firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0111" date="1618833600">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0111" date="1618920000">-     *The following fixes were incorporated in this version:**
    
      * Incorrect programming of the PHY ERROR COUNTERS parameter caused the amber LED to be lit, resulting in a false warning. The counter condition was corrected and the amber LED now functions correctly.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v191365/D8000_v0111.html) for the complete listing of fixes,
    enhancements, known issues and work-arounds corresponding to this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0118" date="1635163200">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0118" date="1635249600">-     *The following fixes were incorporated in this version:**
    
      * User was not able to collect ddump logs.
    
      * Logical Fault LED remains ON even after clearing the fault using "reboot soft"
    
      * Vendor ID showed as "DEFAULT" for D8000 expander in SSACLI enclosure detail
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v203448/20-D8000-Gen10RN0118_ED1.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0130" date="1667304000">-     *The following enhancement has been added in this version:**
    
      * Added support of Rhel 7.8 
    
      * Added support of Rhel 8.2 
    
      * Added support of SLES15 SP2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0130" date="1667390400">-     *The following fixes were incorporated in this version:**
    
      * Smart Array reporting "Storage Enclosure FW upgrade Problem Detected".
      * PSU version is showing as "No Ver" after inserted the New bel power PSU.
      * GEM_5_2 Coverity defect fix.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v218471/20-D8000-Gen10RN0130_ED1.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0130-3.1" date="1708689600">-     *The following fixes were incorporated in this version:**
    
      * Smart Array reporting "Storage Enclosure FW upgrade Problem Detected".
      * PSU version is showing as "No Ver" after inserted the New bel power PSU.
      * GEM_5_2 Coverity defect fix.
    
    Please refer to the _[Release
    Notes_](https://downloads.hpe.com/pub/softlib2/software1/pubsw-
    linux/p480571592/v234513/20-D8000-Gen10RN0130B_ED3.html) for the complete
    listing of fixes, enhancements, known issues and work-arounds corresponding to
    this firmware.</changelog>
  </package>
  <package pkgid="eef42b5de5653503bdf08f0ac6aa69e472a23b8e419ee99cdfde7203121da686" name="firmware-dl20gen10plus_me" arch="x86_64">
    <version epoch="0" ver="06.00.03.604" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.035" date="1646568000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.039" date="1646654400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the System ROM contains updates aligned with the Tatlow PLR2
    BKC WW50.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.200" date="1653566400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the MCTP PCIe devices could not be discovered after
    an SPS firmware update without an AC power cycle. This issue is not unique to
    HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.204" date="1667908800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version is in compliance with Intel IPU.2022.3 guidance.
    
    The following vulnerabilities have been addressed in this SPS release:
    CVE-2022-29515. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676289600">-     This version is in compliance with IPU.2023.1 guidance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2022-36794. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.505" date="1691496000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.604" date="1705924800">-</changelog>
  </package>
  <package pkgid="b88feacf5ab999c623c3cffd0a471131895d38460c888a069ac65b289e890bc1" name="firmware-dl20ml30gen10sps" arch="x86_64">
    <version epoch="0" ver="05.01.04.913" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.208" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623067200">-     See the release document in Download Product Binaries page from Product
    Summary of the firmware product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2020-24509.
    These security vulnerabilities are documented in Intel Security Advisory
    INTEL-SA-00459.  These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.400" date="1644321600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2021-0060. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.500" date="1652184000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.600" date="1660046400">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.2 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.700" date="1667908800">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.804" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.913" date="1691496000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with Intel IPU.2023.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.913-2.1" date="1710590400">-</changelog>
  </package>
  <package pkgid="9ee4d48896655ae5a98c1a2f64127d23da7991fb9e44f3d7450c9d89ca289bbe" name="firmware-fc-emulex" arch="x86_64">
    <version epoch="0" ver="2023.10.01" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2021.11.01" date="1635508800">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.03.01" date="1648641600">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    12.8.528.21
    
    12.8.528.21
    
    12.8.528.10
    
    12.8.502.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.08.01" date="1656936000">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.08.01-2.1" date="1658318400">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.09.01" date="1658404800">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.21
    
    14.0.499.21
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.20
    
    14.0.499.20
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.10.01" date="1671451200">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.25
    
    14.0.499.25
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.03.01" date="1674820800">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.0.499.29
    
    14.0.499.29
    
    14.0.499.2
    
    14.0.490.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.08.01" date="1692705600">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.2.589.5
    
    14.2.589.5
    
    14.2.579.0
    
    14.2.566.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.2.589.5
    
    14.2.589.5
    
    14.2.579.0
    
    14.2.566.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.2.589.5
    
    14.2.589.5
    
    14.2.579.0
    
    14.2.566.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.2.589.5
    
    14.2.589.5
    
    14.2.579.0
    
    14.2.566.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.2.589.5
    
    14.2.589.5
    
    14.2.579.0
    
    14.2.566.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.2.589.5
    
    14.2.589.5
    
    14.2.579.0
    
    14.2.566.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.2.589.5
    
    14.2.589.5
    
    14.2.579.0
    
    14.2.566.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.2.589.5
    
    14.2.589.5
    
    14.2.579.0
    
    14.2.566.0
    
    Added support for:
    
    RedHat Enterprise Linux 8.8
    
    RedHat Enterprise Linux 9.2
    
    SuSE Linux Enterprise Server 15 SP5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.10.01" date="1701950400">-     This Firmware package contains following firmware versions:
    
    **Adapter**
    
    **Speed**
    
    **Universal Boot Image**
    
    **Firmware**
    
    **UEFI**
    
    **Boot Bios**
    
    HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.2.589.21
    
    14.2.589.21
    
    14.2.589.16
    
    14.2.566.0
    
    HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter
    
    16Gb
    
    14.2.589.21
    
    14.2.589.21
    
    14.2.589.16
    
    14.2.566.0
    
    HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.2.589.21
    
    14.2.589.21
    
    14.2.589.16
    
    14.2.566.0
    
    HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.2.589.21
    
    14.2.589.21
    
    14.2.589.16
    
    14.2.566.0
    
    HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.2.589.19
    
    14.2.589.19
    
    14.2.589.16
    
    14.2.566.0
    
    HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    14.2.589.19
    
    14.2.589.19
    
    14.2.589.16
    
    14.2.566.0
    
    HPE SN1700E 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.2.589.19
    
    14.2.589.19
    
    14.2.589.16
    
    14.2.566.0
    
    HPE SN1700E 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    14.2.589.19
    
    14.2.589.19
    
    14.2.589.16
    
    14.2.566.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.10.01-3.1" date="1709294400">-     This component is FIPs enabled.</changelog>
  </package>
  <package pkgid="7786b116c2679a45f292da67a4b7bb4bcac0460927a4846f76efe0d1ca0ec190" name="firmware-fc-qlogic" arch="x86_64">
    <version epoch="0" ver="2023.10.01" rel="2.2"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.09.01" date="1658750400">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    1.77.12
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.06.27
    
    09.09.00
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.06.27
    
    09.09.00
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2022.10.01" date="1671451200">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.01
    
    09.09.00
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.01
    
    09.09.00
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.03.01" date="1674820800">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.03
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.03
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.03
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.03
    
    09.09.20
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.04.01" date="1679659200">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.04
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.04
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.04
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.04
    
    09.09.20
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.04.02" date="1685448000">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.00.01
    
    9.09.00
    
    7.19
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.06
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.07.06
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.06
    
    09.09.20
    
    7.28
    
    0.0
    
    HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.07.06
    
    09.09.20
    
    7.28
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.04.02" date="1685534400">-     The Firmware fixes the following:
    
      * Unsuccessful read of the SFP Temperature which will trigger a Server Shutdown. 
      * Message related to a Mailbox 0x48 Firmware dump saved to buffer.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.09.01" date="1692619200">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.01.03
    
    9.12.02
    
    7.24
    
    3.64
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.01.03
    
    9.12.02
    
    7.24
    
    3.64
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.01.03
    
    9.12.02
    
    7.24
    
    3.64
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.01.03
    
    9.12.02
    
    7.24
    
    3.64
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.08.05
    
    09.12.01
    
    7.34
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.08.05
    
    09.12.01
    
    7.34
    
    0.0
    
    HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.08.05
    
    09.12.01
    
    7.34
    
    0.0
    
    HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.08.05
    
    09.12.01
    
    7.34
    
    0.0
    
    Non-disruptive firmware upgrades: non-disruptive firmware updates is enabled
    and will not require a server reboot to apply.
    
    Added support for:
    
    RedHat Enterprise Linux 8.8
    
    RedHat Enterprise Linux 9.2
    
    SuSE Linux Enterprise Server 15 SP5</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.09.01" date="1692705600">-     Fixed the following behavior:
    
    Temperature Misreading: the adapter was reading incorrect reading of the
    temperature on the HPE SN1610Q 32Gb Fibre Channel Host Bus adapter's Small
    Form-factor Pluggable. The symptom would result in a temperature spike and
    potentially reset the system</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.10.01" date="1701950400">-     This Firmware package contains following firmware versions:
    
    Adapter
    
    Speed
    
    MBI
    
    Firmware
    
    UEFI
    
    Boot Bios
    
    HPE SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.02.05
    
    9.14.00
    
    7.25
    
    3.68
    
    HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter
    
    16Gb
    
    02.02.05
    
    9.14.00
    
    7.25
    
    3.68
    
    HPE SN1600Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.02.05
    
    9.14.00
    
    7.25
    
    3.68
    
    HPE SN1600Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.02.05
    
    9.14.00
    
    7.25
    
    3.68
    
    HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.09.07
    
    09.14.01
    
    7.36
    
    0.0
    
    HPE SN1610Q 32Gb Single Port Fibre Channel Host Bus Adapter
    
    32Gb
    
    02.09.07
    
    09.14.01
    
    7.36
    
    0.0
    
    HPE SN1700Q 64Gb Dual Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.09.07
    
    09.14.01
    
    7.36
    
    0.0
    
    HPE SN1700Q 64Gb Single Port Fibre Channel Host Bus Adapter
    
    64Gb
    
    02.09.07
    
    09.14.01
    
    7.36
    
    0.0</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2023.10.01-2.2" date="1709294400">-     This component is FIPs enabled.</changelog>
  </package>
  <package pkgid="b720c247fd7b39f79a4d50a4179686f4dda4c0d6e09810f959f22c43841d78bd" name="firmware-hca-mellanox-vpi-connectx4" arch="x86_64">
    <version epoch="0" ver="1.0.15" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1632744000">-     *Following issues have been fixed in firmware version 12.28.2006:**
    
      * An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.31.1200:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * An assert that was caused when trying to open 1024 functions on the device and the maximum number of functions was 1023.
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to hang.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
    
    **Additional Fixes included in version 16.31.1200:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1648468800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)
      * 825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.32.1010:**
    
      * 879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)
      * 872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    
    
    **New Features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    
    
    **New features and changes included in version 16.32.1010:**
    
      * Added support for blocking unwanted GMP classes by dedicated MADs.
      * Added a new NvConfig parameter LOG_MAX_QUEUE to set the maximum number of work queue resources (QP, RQ, SQ...) that can be created per function. The default value is 2^17.
      * Added a Congestion Control Key to all Congestion Control MADs to authenticate that they are originated from a trusted source.
      * Added an SMP firewall to block the option of sending SMPs (MADS sent on QP0 from the Subnet Manager) from unauthorized hosts to prevent fake SMPs from being recognized as the SM.
      * Vendor Specific MADs Class 0x9 is no longer supported by the firmware. In case the firmware detects such MAD, the firmware will return a "NOT SUPPORTED" error to the user.
      * Blocked the VF's ability to use both padding and signature in order to prevent the NIC from getting into an unresponsive state.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its rate limit.
      * Performance improvements in the DCT with AR flow by exposing a hint to the software in DCI software context that indicates that RDMA WRITE on this DCI is not supported.
      * Added support for dynamic timeout mechanism when in InfiniBand mode.
      * Added support for QSHR access register to enable Set and Query rate limit perhost per-port.
      * The firmware now exposes a new Software Steering ICM resource for VXLAN encap expand in order for the SW Steering to manage this resource directly.
      * Added support for asymmetrical VFs per PF. To enable it: PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a none zero value.
      * Added 2 new MAD access registers to enable mlxlink to read/write access registers by LID (to the whole subnet).
      * Enabled the exposure of new ICM resource to the software steering for VXLAN encapsulation expansion.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Disabled VST on dual port adapter cards when one port is configured as ETH and the other as IB as VST is not available when the port is set as ETH.
      * Added support for DSFP AOC (CMIS) v4 when error code is not reported by the module.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1648555200">-     *Fixes in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed n issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.32.1010**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * The system got into an unresponsive state when a peer port went down while using an Optical module.
      * Invalid RNR timeout when trying to set it during the rts2rts_qp transition.
      * A fatal assert 0x81C5 occurred when calling get_vport_mad from the MAD APIs. The firmware was trying to compute the number of vPorts using a global function number. To avoid this issue, the API was updated to remove any assumption on the function number. Note: This issue is affects only IB devices.
      * During events, stress caused the firmware to reset the Arm host of the vPort without sending an event. Thus preventing the software from rearming the vPort as it did not receive any event, and the firmware did not send the event because the vPort had no Arm set.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.
      * An issue related to the sl2vl mad that caused a few msec hiccup in the transmission on an InfiniBand network when the SM sent the sl2vl mad to a node in the cluster.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13" date="1663156800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)
      * 825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.33.1048:**
    
      * 879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)
      * 872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    
    
    **New Features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    
    
    **New features and changes included in version 16.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13" date="1663243200">-     *Fixes in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.33.1048**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.14" date="1680436800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)
      * 825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.35.1012:**
    
      * 879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)
      * 872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    
    
    **New Features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    
    
    **New features and changes included in version 16.35.1012:**
    
      * Added support for copy modify header steering action to/from the UDP field.
      * Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.
      * QoS priority trust default state can now be changed using the new nvconfig below: 
        * QOS_TRUST_STATE_P1
        * QOS_TRUST_STATE_P2
    
    The values that can be used to set the default state are:
    
      * TRUST_PORT
      * TRUST_PCP
      * TRUST_DSCP
      * TRUST_DSCP_PCP</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.14" date="1680523200">-     *Fixes in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions. 
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15" date="1694001600">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)
      * 825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)
    
    **Firmware for the following devices has been updated to 16.35.3006:**
    
      * 879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)
      * 872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 841QSFP28 Adapter)
    
    Important : Security Hardening Enhancements - This release contains important
    reliability improvements and security hardening enhancements. HPE recommends
    upgrading your device firmware to this version to improve the firmware
    security and reliability of your device.
    
    **New Features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    **New features and changes included in version 16.35.3006:**
    
      * Enabled ACS for single port cards.
      * Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15" date="1694088000">-     *The following issues have been fixed in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.15-2.1" date="1710936000">-     *The following issues have been fixed in version 12.28.2006:**
    
      * Fixes an issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
  </package>
  <package pkgid="56cca5b9610c4bdb6ce73322f5d00bfcc6c0b5a1119fadde30f8882f75ab1cbc" name="firmware-hca-mellanox-vpi-connectx6-mft" arch="x86_64">
    <version epoch="0" ver="1.0.12" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1632744000">-     *The following issues have been fixed in version 20.31.1014:**
    
      * Occasional performance issues related to RC QPs using E2E-credits (not connected to SRQ and doing send/receive traffic) when the ROCE_ACCL tx_window was enabled.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * A rare issue that caused RX pipe to unresponsive state.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
      * CRT_DCR with index larger than 1 &lt;&lt; 21 occasionally collided with the CRT_SW_RESERVED address.
      * An issue that caused the TX queue to get into an unresponsive state when the VF rate limiter was set.
      * In InfiniBand non-virtualization system, due to a corrupted steering root, traffic fails after a warm reboot.  
    
                                                                             
    **Additional Fixes included in version 20.31.1014:**
    
      * Disabled the CNP counter "rp_cnp_ignored " (triggered by OOS (out-of-sequence)) when all ports are IB.
      * Fixed the TMP421 sensor temperature reporting.
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.            
      * Improved PortXmitWait IB counter accuracy.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1648468800">-     *Firmware for the following devices has been updated to 20.32.1010:**
    
      * HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06251-B21
    
    **New features and changes included in version 20.32.1010:**
    
      * Added support for blocking unwanted GMP classes by dedicated MADs.
      * Added a new NvConfig parameter LOG_MAX_QUEUE to set the maximum number of work queue resources (QP, RQ, SQ...) that can be created per function. The default value is 2^17.
      * Added a Congestion Control Key to all Congestion Control MADs to authenticate that they are originated from a trusted source.
      * Added an SMP firewall to block the option of sending SMPs (MADS sent on QP0 from the Subnet Manager) from unauthorized hosts to prevent fake SMPs from being recognized as the SM.
      * Vendor Specific MADs Class 0x9 is no longer supported by the firmware. If case the firmware detects such MAD, the firmware will return a "NOT SUPPORTED" error to the user.
      * Blocked the VF's ability to use both padding and signature in order to prevent the NIC from getting into an unresponsive state.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its rate limit.
      * Performance improvements in the DCT with AR flow by exposing a hint to the software in DCI software context that indicates that RDMA WRITE on this DCI is not supported.
      * Added support for dynamic timeout mechanism when in InfiniBand mode.
      * Added support for QSHR access register to enable Set and Query rate limit per-host per-port.
      * The firmware now exposes a new Software Steering ICM resource for VXLAN encap expand in order for the SW Steering to manage this resource directly.
      * Added support for asymmetrical VFs per PF. To enable it: PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a none zero value.
      * Added 2 new MAD access registers to enable mlxlink to read/write access registers by LID (to the whole subnet).
      * Enabled the exposure of new ICM resource to the software steering for VXLAN encapsulation expansion.
      * Added support for DSFP AOC (CMIS) v4 when error code is not reported by the module.
      * Limited the external loopback speed according to the used module's capabilities.
      * Modified the Effective BER calculation method. Due to this, the value of the Effective BER will be slightly higher, however the link quality remains the same as prior to this change.
      * This firmware version includes the following PCIe changes: 
        * Fixed the ACS Port Number field in DSPs and ACS Egress Control Vector field in DSPs.
        * Added support for VSC on USP of PCIe Switch.
        * Fixed the mapping of Legacy Interrupts in the PCIe Switch.
        * Fixed MRRS &amp; MPS configurations in DSPs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1648555200">-     *The following issues have been fixed in version 20.32.1010:**
    
      * System could not create more than 128K QPs.
      * Incorrect indication of the PCIe link down in the AER registers on PCIe switch upstream port.
      * Invalid RNR timeout when trying to set it during the rts2rts_qp transition.
      * The flash frequency on boot was lower than expected (under 50Mhz). The issue was fixed by enabling the firmware to increase it on boot2 to normal frequency.
      * A race condition between DC QP flush and DC packets that led to stuck slices in the hardware. To avoid such situation, firmware keeps the TCU drop set until QP flush is done.
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1663156800">-     *Firmware for the following devices has been updated to 20.33.1048:**
    
      * HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21
    
    **New features and changes included in version 20.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation. 
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter. 
      * Crypto features can be in either wrapped or unwrapped mode. Meaning, the key can be wrapped or in plaintext when running the CREATE_DEK PRM command. To comply with the requirements specified in FIPS publication, all the created DEKs must be wrapped.  
    This feature adds new NV_CONFIG per device to control this mode, and enables
    the user to change all the crypto features to wrapped or cleartext.
    
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1663243200">-     *The following issues have been fixed in version 20.33.1048:**
    
      * An issue where RDMA write may experience performance degradation when working with Adaptive Routing and DCT half-handshake mode.
      * An issue that ignored the default value of TX_SCHEDULER_BURST when its value in the ini was different than "0".
      * Implemented SLD detection code. Surprise Down Error Reporting Capable value was changed from 1 to 0 in boards where the downstream perst was not controlled thus causing SLD detection not to function properly.
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * RDMA_WRITE traffic performance degradation that occured when working with DC on Adaptive Routing network.
      * Bad cache invalidations of destroyed QPs.
      * A rare case where asserts and ext_synd appeared in dmesg after performing driver restart. 
      * An issue related to host isolation on multi-host systems.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1680436800">-     *Firmware for the following devices has been updated to 20.35.1012:**
    
      * HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21
    
    **New features and changes included in version 20.35.1012:**
    
      * Added support for copy modify header steering action to/from the UDP field.
      * Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.
      * QoS priority trust default state can now be changed using the new nvconfig below: 
        * QOS_TRUST_STATE_P1
        * QOS_TRUST_STATE_P2
    
    The values that can be used to set the default state are:
    
      * TRUST_PORT
      * TRUST_PCP
      * TRUST_DSCP
      * TRUST_DSCP_PCP
      * Added support for using SetEventReceiver PLDM command with mode polling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1680523200">-     *The following issues have been fixed in version 20.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * The RXT E2E inflight went into an unresponsive state occasionally.
      * RDMA partition was reported even if NIC+RDMA mode was disabled.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * An incorrect address issue for XRQ Event Backend Controller Px Syndrome event in multi-host system during FLR.
      * PCIe SKP OS generation interval issue for Gen1 and Gen2.
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.
      * PLDM AEN event receiver was required to be cleared on PCIe reset in case the media type was MCTP over PCIe VDM.
      * Asynchronous messages were sent over MTCP before endpoint discovery was done.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1694001600">-     *Firmware for the following devices has been updated to 20.37.1700:**
    
      * HPE InfiniBand HDR/Ethernet 200Gb 1-port QSFP56 PCIe3 x16 MCX653105A-HDAT Adapter - P06154-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 1-port QSFP56 PCIe3 x16 MCX653105A-ECAT Adapter - P06250-B21
      * HPE InfiniBand HDR100/Ethernet 100Gb 2-port QSFP56 PCIe3 x16 MCX653106A-ECAT Adapter - P06251-B21
    
    Security Hardening Enhancements: This release contains important reliability
    improvements and security hardening enhancements. HPE recommends upgrading
    your device's firmware to this release to improve the firmware security and
    reliability of your device.
    
    
    
    **New features and changes included in version 20.37.1700:**
    
      * A new capability enables the VM to track and limit its Vport's activity. This is done using the new q_counters counter which enables aggregation of other Vport's from PF GVMI.
      * Updated the link maintenance flow to avoid high uncorrectable error rate.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1694088000">-     *No new fixes have been included in version 20.37.1700**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1695556800">-     *The following issues have been fixed in version 20.40.1000:**
    
      * RDE LLDPTransmit ChassisID was occassionally not represented correctly.</changelog>
  </package>
  <package pkgid="630dc6089d413ee2562b51db12cf9ba4ca4dd3c56f2a5a6d3fe646531df911a9" name="firmware-hca-mellanox-vpi-eth-ib" arch="x86_64">
    <version epoch="0" ver="1.0.12" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1572955200">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5052:**
    
      * Fixed Uncorrectable Machine Check Exception issue. The internal resources for handling packets were not allowed to be flushed when the driver was brought down and occasionally caused Red Screen of Death (RSOD). The fix was applied to the ROM code only and has only external timing influences upon the driver's teardown.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1592395200">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1592481600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1601899200">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21
    
    **Firmware for the following device is updated to 2.42.5700:**  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.
    
    **New features and changes in firmware version 2.42.5700.**
    
      * Modified the mlx_cmd_get_mlx_link_status command return value to return "Link Type = Ethernet" in Ethernet adapter cards.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1601985600">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1614254400">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21
    
    **Firmware for the following device is updated to 2.42.5700:**  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.
    
    **New features and changes in firmware version 2.42.5700.**
    
      * Modified the mlx_cmd_get_mlx_link_status command return value to return "Link Type = Ethernet" in Ethernet adapter cards.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1614340800">-     *Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12-2.1" date="1663156800">-     *Firmware for the following devices are updated to 2.42.5000:**  
        764282-B21  
        764286-B21  
    
    **Firmware for the following devices are updated to 2.42.5056:**  
        764283-B21  
        764284-B21
    
    **Firmware for the following device is updated to 2.42.5700:**  
        764285-B21
    
    **New features in firmware version 2.42.5000:**
    
      * Added support for the following features. 
        * new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.
        * User MAC configuration.
        * Automatically collecting mstdump before driver reset.
        * A mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.
        * A new field is added to "set port" command which notifies the firmware what is the user_mtu size.
      * Improved the debug ability for command timeout cases.
    
    **New features and changes in firmware version 2.42.5700.**
    
      * Modified the mlx_cmd_get_mlx_link_status command return value to return "Link Type = Ethernet" in Ethernet adapter cards.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12-2.1" date="1663243200">-     *The following changes have been made in sub-version 1.0.12(A):**
    
      * Product rebuilt to have the new SHA 384 signature.
    
    **Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12-3.1" date="1710936000">-     *The following changes have been made in sub-version 1.0.12(A):**
    
      * Product rebuilt to have the new SHA 384 signature.
    
    **Fixes in version 2.42.5000:**
    
      * PortRcvPkts counter was prevented from being cleared after resetting it.
      * The system Timed Out on the configuration cycle of the Virtual Functions (VFs) when more than 10 Virtual Functions performed FLR and the completion Time Out value was configured to a range of less than 16 msec.
      * The server hangs and results in NMI when running "mlxfwtop -d mt4103_pci_cr0" while restarting the driver in parallel (from a different thread). In this case, the downstream bridge over the device reported completion timeout error.
      * In flow_steering, BMC could not receive a ping over IPV6 after running bmc_reboot.
      * While closing the HCA, the RX packet caused bad access to resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.
      * The master SMLID and the LID was either 0 or 0xFFFF when the port was neither active nor armed.
      * ibdump could not capture all MADs packets.
      * link did not go up after reboot.
      * Fixed a rare issue that cause the PCIe configuration cycle that arrived during the time of sw_reset to generate 2 completions.
      * Network Controller Sideband Interface (NC-SI) did not work when adding the disable_static_steering_ini field in the ini file, due to memory allocation issue for this field in the scratchpad.
    
    **Fixes in version 2.42.5056:**
    
      * Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</changelog>
  </package>
  <package pkgid="225df4391503b21b3e18ce99054de0dd049ebf216efff6ba722ef5e5f03cb7db" name="firmware-hdd-017797f12e" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1695729600">-      Firmware contains fix for bug that may cause drive to perform self-initiated reset in systems where maximum queue depth of 128 is exceeded.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1708689600">-      High Security Enablement support FIPs</changelog>
  </package>
  <package pkgid="00ad71850b2f4c29626d32c863a3d6ef4294b38a4fd9eff43b2f8841baba19dd" name="firmware-hdd-020fc874ad" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1680264000">-      Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1708171200">-      Assert fixes, logging enhancements and all current firmware improvements and bug fixes.</changelog>
  </package>
  <package pkgid="41d83a50c5337d1d357fcde26301323070efb3708293b29f158689929518744d" name="firmware-hdd-035a863453" arch="x86_64">
    <version epoch="0" ver="HPK5" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5" date="1671105600">-      Fixed an incompatibility issue in MCTP over PCIe VDM function
      * Updated WCTEMP value for thermal throttling threshold</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-2.1" date="1674820800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-2.1" date="1674907200">-      Fixed an incompatibility issue in MCTP over PCIe VDM function
      * Updated WCTEMP value for thermal throttling threshold</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1674993600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1675080000">-      This component provides support only for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-3.1" date="1675166400">-      Fixed an incompatibility issue in MCTP over PCIe VDM function
      * Updated WCTEMP value for thermal throttling threshold</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-4.1" date="1692619200">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-4.1" date="1692705600">-      Fixed an incompatibility issue in MCTP over PCIe VDM function
      * Updated WCTEMP value for thermal throttling threshold
      * Fixed CA &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00130699en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-5.1" date="1704110400">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="c688f7ce4017f17f18b60724a095b9bbaebfba731f5d0cdecfee2c6a4d93598c" name="firmware-hdd-059b8654a6" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="631e08ec5e4854c19f7e0a0f76c2603648f2e1382f0c12d49677635042bf671a" name="firmware-hdd-0a7010918e" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661428800">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1689163200">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="343149aae50e0e471ac644c2eeada3f20124cc591b260144e305273dbf11b6d2" name="firmware-hdd-0a7d4aa47f" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1614686400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661428800">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1689163200">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="1eec7cdcd1b1d18099de24472b499859625ce1bef59ed751127730d5ccae0a1c" name="firmware-hdd-10385ef3e6" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-10.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="7644a4caa6d6adc37b2560c255a6d64eb2cf6978abd9d93da2ba7c56d7877000" name="firmware-hdd-12304c1aca" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661428800">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-2.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1693915200">-      Update maximum continuous operation temperature values for host thermal management and reporting.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1708948800">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="13f88f72375451151f91fafacf69f71b2a9e9ca93c3afe6a1c9249a3ad4a71a6" name="firmware-hdd-18e328f036" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7" date="1664366400">-      Fixed an intermittent issue where the incorrect model number can be reported during spin-up</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-2.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-2.1" date="1680264000">-      Fixed an intermittent issue where the incorrect model number can be reported during spin-up</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1695988800">-      Optimize thermal maximum continuous operation temperature values</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1708948800">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="a3960cbb3fb01391861956881f4590e3a544d824bfd26afda636c7ac0b5fb92c" name="firmware-hdd-1a541ed00d" arch="x86_64">
    <version epoch="0" ver="GPK5" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3" date="1647950400">-      Fix FW issues and add thermal feature requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK4" date="1680264000">-      Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK4-2.1" date="1681300800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK4-2.1" date="1681387200">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1708776000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="86aa87315c89aa093198a38b149f08a536a54145dc5b4f13c0fad2e241942a64" name="firmware-hdd-1e51a57347" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-8.1" date="1689163200">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="7b00d19d7e16f0eace99f9e19242aedae1639dfbb13d224752810939ee839b97" name="firmware-hdd-24384980ec" arch="x86_64">
    <version epoch="0" ver="HPD1" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1615896000">-      VENDOR IDENTIFICATION field change from "HP" to HPE". Support for second source PMIC from IDT.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-6.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="0a284252a246400257e696d5e12c226c9963f713b0357212b726482be978f191" name="firmware-hdd-24fe569b72" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1639915200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1640001600">-      This firmware mitigates a potential reliability concern.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="28f892cfca1a5e83f66a5ffc54fe7bae782ded4543de41333136a0b5a7f021ed" name="firmware-hdd-252770cdda" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-10.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-10.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-11.1" date="1689422400">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="a7322c72a33dd653f02cf5551d68185f4603a021ff6ce398a25520b517c7dc16" name="firmware-hdd-2af7385a1e" arch="x86_64">
    <version epoch="0" ver="HPK7" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5-5.1" date="1652702400">-      Optimized T-offset setting.
      * Change MQES setting to 8192.
      * Fixed LED Behavior misaligned specs issue.
      * Fixed performance drop issue when 4+ SSD are installed.
      * The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6" date="1652961600">-      Main fixes are for Secure boot(Option ROM) ILO error and critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-2.1" date="1661256000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-2.1" date="1661342400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-2.1" date="1661428800">-      Main fixes are for Secure boot(Option ROM) ILO error and critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-3.1" date="1681300800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK6-3.1" date="1681387200">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK7" date="1692705600">-      Maintenance release with fix for LED off during idle</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK7-2.1" date="1703937600">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="445ab4f171740bbdd01dbe0e98cb94e07ed6709685984a0d6b8d9b2941f78ed8" name="firmware-hdd-2c27a7a9a4" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1628164800">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="e6ca5d599828dc061d8ca68b431a38ad0570900b276a85b8f8f337602ad36639" name="firmware-hdd-2cfaac41db" arch="x86_64">
    <version epoch="0" ver="HPDB" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-11.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-11.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-12.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="8b1572594a297c32fe9e6791eb9238e102def4b686130d4fea91f5af9832b2fb" name="firmware-hdd-2e4c61fc63" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652702400">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1661428800">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="256b3e548cbb5a829ec8b650b23c1a37bddf7806b63b7b9b685c89d44c32a3e3" name="firmware-hdd-3243fce9a0" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-13.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="73bddafda3b1803a4367b7d19e4bb351d24b98a90ce786a0c03e4056c37586a7" name="firmware-hdd-3496cc4743" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1680264000">-      Adds support for a second source drive pre-amp, and improves reliability with an updated direct offline scan algorithm.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1708171200">-      Update maximum continuous operation temperature values for host thermal management and reporting.
      * Assert fixes, logging enhancements and all current firmware improvements.</changelog>
  </package>
  <package pkgid="a6e6d78b08ce9233ba0d1bb3622b15e6defccd4647b371155f98d2740e43f454" name="firmware-hdd-35fd24601f" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1689940800">-      Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1709208000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="62048e5365b467f755bc315c1e2de157d9cf12c9f1d900521cd6c67cbc28bf73" name="firmware-hdd-3815d4b024" arch="x86_64">
    <version epoch="0" ver="GPK7" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK3-3.1" date="1632312000">-      Added support for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5" date="1647950400">-      Fix FW issues and add thermal feature requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK6" date="1680264000">-      Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK6-2.1" date="1681300800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK6-2.1" date="1681387200">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK7-2.1" date="1708862400">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="9dc5c3d861956069ce12046f982dea37be1b95460578f20e834a3cbc97bf2f4d" name="firmware-hdd-3ab4c70e64" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="14.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-9.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-10.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-11.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-12.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-13.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-13.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-14.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="a5d3e92c4c57954a07b97b82d0dec713cb1f0257e007e09469847c300e8cb689" name="firmware-hdd-3d97759111" arch="x86_64">
    <version epoch="0" ver="HPDA" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1670932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1671019200">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1692705600">-      Optimize sensor reporting to improve failure rate - AFR (Annual Failure Rate) metrics</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1709208000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="aead694cfbdab1ba98add2817145c26f9f7dcc322e7df3126d93474a8a6f5727" name="firmware-hdd-3db7640485" arch="x86_64">
    <version epoch="0" ver="HPGG" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613563200">-      Improvements to Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-6.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="5a05283d8eb9b91e5ea1d1bb7c3274fa1625f21d80dbe5773efa8fe8d81d8162" name="firmware-hdd-41cdb1c9da" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-10.1" date="1689249600">-      High Security Enablement support FIPs</changelog>
  </package>
  <package pkgid="8630f0411b6cf6555d7e96000630bcde557d6f6715c97aede525e760d49c8c8a" name="firmware-hdd-42aff4675b" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1640260800">-      Fix command timeout and uncorrectable error improvement.
      * Added features for SAS4 auto power swtiching and thermal requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1658232000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1658318400">-      FW update to eliminate the risk of data error at unexpected power-off during specific I/O combination.
      * Adjust SoC clock in fw to bridge the LBA info. transfer timing gap and remove the risk of buffer CRC error.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1661428800">-      Added support for RHEL 9</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1689163200">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="a8c0a24073fefe5b6f81330f0a957fab8e58c15f4ef057b3cf20fc70835c9fbb" name="firmware-hdd-46fc43ab26" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-11.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-11.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-12.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="1d187f9a7e72c34f8fcaeae8c1a62e277b24f011b6b0f9b108737eb0bad2e77f" name="firmware-hdd-481c8ea9a7" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-5.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us&gt;.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-6.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1689163200">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="9fb4a6cc24763a8d518a43a55922e6974b22c6f21ea5beccc5ce32ceeeb9e7b3" name="firmware-hdd-492a9952f6" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1630497600">-     These firmware release add a foreground media scan policy to prevent a
    Predictive Failure and add SMART Attribute value for the FMS count.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1658836800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1658923200">-      HPG4 implements a change in Background Media Scan triggering threshold based on a unique retention characteristic to help address a Predictive Failure.
      * For the drives reporting the predictive failure, please update to HPG4 and please power cycle the server or re-seat the drives to clear the predictive failure record  after one full Media Scan (10 days). Media Scan in HPG4 will scrub error during these 10 days.
      * For the drives that do not report the PF, you can update to HPG4 directly without power cycle the server or drives.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00124896en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1682510400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1682596800">-      Fixed an issue to Allow Drives to update Firmware even though the Drive is in Predictive Failure Condition</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="8f80cdb990ff426ebae331422e3e511686d698d034fafcda352a56039afda385" name="firmware-hdd-4b4177239b" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1630670400">-      Improved Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1648555200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1648641600">-      Firmware Capacity charge timeout threshold is increased to 14 seconds.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1689163200">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="3e48d541491acfbf7d3d9394e3ab748b7f1af9974de9b94fb48a33c0e69d6e0d" name="firmware-hdd-4ba9615f90" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1628078400">-     This firmware release provides additional protection against command timeouts.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1629806400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1629892800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1629979200">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652702400">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1689163200">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="da927160305156373025a433598370bb83656c6d0956c5af36c4ca50819e4fd7" name="firmware-hdd-4c048aaeb0" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1614772800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.
      * For more information, refer to HPE Customer Advisory at the following URL:&lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-7.1" date="1689163200">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="7b4693563bdf347148cf9099e24562f388c032716faa0b3d47cddde66d360c76" name="firmware-hdd-4fbb6d96e5" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1661428800">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1666267200">-      Added support for RHEL 9</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2" date="1708171200">-      Update maximum continuous operation temperature values for host thermal management and reporting.
      * Assert fixes, logging enhancements and all current firmware improvements.</changelog>
  </package>
  <package pkgid="b995d5a09c221fcae6dbb9df18cf8a7e9000f37ca404905f6be43c91ced44ebc" name="firmware-hdd-54addf5312" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1632484800">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-7.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-7.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-7.1" date="1652702400">-      This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-8.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-10.1" date="1681300800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-10.1" date="1681387200">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-11.1" date="1689076800">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="02f43074ac5edfbc45066f8d20021b1bc77aa1dad26f8cf27c7877a8bf835ec9" name="firmware-hdd-5bf9355926" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-11.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="5f272a53b1e20c693fdf72dd878ba872ad9ad6df110fe7cb47e90d2dfdac2708" name="firmware-hdd-5dcf26fa42" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-10.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="27689f6faab255de4a725a9872072563d3893d100da18b9ef68d0d14f0d9571e" name="firmware-hdd-624b75c7e2" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-7.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1632484800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1652702400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1689163200">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="64e812a4af5b2eef4cac7633267f371e3dbcf9e6f2ac4aff5fcacddf8772aaab" name="firmware-hdd-6628fce235" arch="x86_64">
    <version epoch="0" ver="EPK76H3Q" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-4.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK75H3Q-4.1" date="1652702400">-      Fixed False UECC issue at idle power mode.
      * Old FW download Blocking (EPK70H3Q~EPK74H3Q).
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q" date="1652961600">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q-2.1" date="1661256000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q-2.1" date="1661342400">-      Added support for RHEL 9</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q-2.1" date="1661428800">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q-3.1" date="1692619200">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q-3.1" date="1692705600">-      Fixed CA &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; EPK76H3Q-4.1" date="1704110400">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="f79b6ce4e5627fe7dbe4ac744f4617fbef4887b61cc637b76d9ce0eae6cc6859" name="firmware-hdd-6758a46eb7" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3" date="1666180800">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3" date="1666267200">-      OCP v2.0 feature support 
      * NVMe-MI over PCIe VDM support 
      * Bug fixes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3-2.1" date="1674820800">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3-2.1" date="1674907200">-      OCP v2.0 feature support 
      * NVMe-MI over PCIe VDM support 
      * Bug fixes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3-3.1" date="1674993600">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3-3.1" date="1675080000">-      This component provides support only for VMD enabled Intel VROC platform..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4IASHPK3-3.1" date="1675166400">-      OCP v2.0 feature support 
      * NVMe-MI over PCIe VDM support</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1692705600">-      Reverted OCP spec features to maintain compliance to OCP spec commands over NVMe-MI
      * Implemented real Active Measured Latency by adding OCP 2.0 C3 Log page</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-2.1" date="1703937600">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="b7c55cb1b1c7ddc71cdb9113d0162c0a834a6b2602e5d364045fc5e951c575e6" name="firmware-hdd-68b12e54d2" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="26c4f641427d0fdefb18b4f8c4aab19ba60cd7eab684e28b4dc388d1da7c8a73" name="firmware-hdd-693b9a2853" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617883200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="d978cba01a722756f0f722756c971d0b12658f7ec337070621cdb1fce989d235" name="firmware-hdd-6b7ce3da0e" arch="x86_64">
    <version epoch="0" ver="HPG2" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-10.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="37e31acd734138fe091d9503a2b0b22784d3cb21407bfe372b63933a7bdcdf3e" name="firmware-hdd-6ec35faf90" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1623240000">-      Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-6.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="3bc7ebe100c73d4b3f2338bde234d49a92489dba2362af682a567d6512c81951" name="firmware-hdd-6fc985bd3b" arch="x86_64">
    <version epoch="0" ver="GPK7" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-5.1" date="1675080000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK5-5.1" date="1675166400">-      This component provides support only for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK6" date="1680264000">-      Fixes Get Endpoint ID (EID) command failure by issuing Set Endpoint ID after Endpoint Discovery</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK6-2.1" date="1681300800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK6-2.1" date="1681387200">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; GPK7-2.1" date="1708862400">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="e9c714344758e737ecc9588e5cf1be31338d31eda43b38e9e7d957a833344ab1" name="firmware-hdd-70e3962f98" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1614772800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1632484800">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1652702400">-      Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.
      * The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-12.1" date="1689163200">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="b2b0e86a9217f975ab6a20b46abbf193f8621fdb6f41f3f339bb3712861600b2" name="firmware-hdd-71af849f3b" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="12.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-11.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-11.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-12.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="1abf2cfd0ae2fc3234cf0a3b25b9c3cffbe079b89df7e823b446f34f2259c8f6" name="firmware-hdd-726d5ec795" arch="x86_64">
    <version epoch="0" ver="HPK2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1661428800">-      Fix for BIOS RSOD issue</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1681300800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1681387200">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1689249600">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="f6d698b91c860708f6a7433c8db298097b15175a40697fff1db74133610622d7" name="firmware-hdd-7505dfb5ae" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652702400">-      Added support for 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="8ded81e603cd2df009d69e6e4f54326c8b2658a68094a83c17bce386561d5b51" name="firmware-hdd-7677644a25" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-11.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="1f8a90a9d08e0db4f08e5b42a3a4e0283a9ec7410a9206c6c683f516eb93cbd7" name="firmware-hdd-7a1edae8e7" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1657108800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1657195200">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.
      * Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1657281600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1657368000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1657454400">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="fdf9b36827ae3a82d705bebbf91f66a6aff929bbc5921b71090a448ca771272a" name="firmware-hdd-7f2a26e6d0" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="69eb7206c637e2f58596d5cf0303709302a6d41715f809c9db59fe696ba07ff0" name="firmware-hdd-7fc5497116" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1617192000">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-6.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="60ae56d9336c9a507286bc789c777c245c269bf807f36fc1e9e77c43bc96d732" name="firmware-hdd-805abb7e9c" arch="x86_64">
    <version epoch="0" ver="85032G00" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85030G00-2.1" date="1598270400">-      Added Support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85031G00" date="1623240000">-      This is a maintenance release that contains various drive reliability enhancements and code fixes accumulated since the last initial release, as well as a change to disable MCTP over PCIe VDM function to satisfy certain HPE platform environments.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00" date="1635249600">-      Implements FW-based VPD.
      * ARP setting is changed from "Capable &amp; Discoverable" to "Fixed &amp; Discoverable".
      * A minor tweak to the Foreground Media Scan (FMS) algorithm to ensure critical variables are initialized properly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-2.1" date="1635336000">-      Added support for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-2.1" date="1635422400">-      Implements FW-based VPD.
      * ARP setting is changed from "Capable &amp; Discoverable" to "Fixed &amp; Discoverable".
      * A minor tweak to the Foreground Media Scan (FMS) algorithm to ensure critical variables are initialized properly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-4.1" date="1680177600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-4.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 85032G00-5.1" date="1689249600">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="34f2cb49306a6817f82b34a0164a246291d9e168d2c102b90c7f667c7c0b2c99" name="firmware-hdd-8173816d98" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1664366400">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1680264000">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1698062400">-      Fixes the logic bug in the media cache cleaning abort handling that caused the drive to choose and execute the R/W command before the Request Sense to prevent assert.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1708171200">-      Assert fixes, logging enhancements and all current firmware improvements and bug fixes.</changelog>
  </package>
  <package pkgid="a67aa243242090eca164f97ddd21800418b83c81dbef3b317299cc3d0c69bfd5" name="firmware-hdd-82894b9e0a" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="4ffd669ad2841a83c9358efb404ae935d6cbcbd24de42e841a2bcc71e8cd5028" name="firmware-hdd-852266afdf" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1640174400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1640260800">-      This firmware mitigates a potential reliability concern.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="90e554f09408613fb214a084e0e4b585ba63b0ebbecec8fb581c39a8ac64da3e" name="firmware-hdd-87b796d9ae" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1687780800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1687867200">-      Improves data integrity
      * Decreases possibility of data corruption in certain error and timing conditions
      * Reduces the probability of hangs</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1707393600">-      Improves performance in certain file systems and implements fixes for several of the previous firmware's shortcomings.
      * The risk of not upgrading to this firmware is the increased possibility of data corruption in certain error and timing conditions.
      * Several maintenance items are included in this firmware revision that reduce the probability of hangs.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="21cb22a678359b836b7f18a9cdf50d148c73ae7a4c1bcc32e775ea5314528900" name="firmware-hdd-8a0371a425" arch="x86_64">
    <version epoch="0" ver="HPDA" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1678881600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1678968000">-      This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.
      * The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.
      * Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1689163200">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="1a116930fc0ba2154db6f6560f08d0cd3deb6c51d31397b837729dbd6cc076d8" name="firmware-hdd-8a2c06af48" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-12.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-12.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-13.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="4743bdd515223c0fc1577e4f406d21a88a7979c4e5258cc47fd641513c4bc94e" name="firmware-hdd-8a7ecf7465" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1615896000">-      If Power On Hours exceeds 70,000hrs, PM2R will report Hardware error (04/4C/A8) after the next Power Cycle and will not accept read/write commands. This fix will update storage location reporting when the maximum number of registrations in the Work Load Log read process reaches 70,000; the last registered 70,000th storage location will be modified to be read as the next (70,001st) storage location.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111296en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      If Power On Hours exceeds 70,000hrs, PM2R will report Hardware error (04/4C/A8) after the next Power Cycle and will not accept read/write commands. This fix will update storage location reporting when the maximum number of registrations in the Work Load Log read process reaches 70,000; the last registered 70,000th storage location will be modified to be read as the next (70,001st) storage location.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111296en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      If Power On Hours exceeds 70,000hrs, PM2R will report Hardware error (04/4C/A8) after the next Power Cycle and will not accept read/write commands. This fix will update storage location reporting when the maximum number of registrations in the Work Load Log read process reaches 70,000; the last registered 70,000th storage location will be modified to be read as the next (70,001st) storage location.
      * For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111296en_us</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1689163200">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="1003982fdb771ce1443295ac9d38ce1841fb1b823f730ac6f1353b19ca7641bc" name="firmware-hdd-8b26d1ef02" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-7.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="87ed780b0be1077a3006e920d29a2fb1bbb9acf153b22a7205e60b0c2df9ce25" name="firmware-hdd-8d68452816" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652702400">-      Added support for RHEL9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661428800">-      Added support for RHEL9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664452800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664539200">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1680264000">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="1bcae2ab26840e17531a782a65fbed74fc6c31cc0d836d33c75274d318a2794b" name="firmware-hdd-8e1e8083c5" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1681387200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1681473600">-      Improve the FW about data mismatch after SPL issued.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="c5c19acf07e58cacb01dcb1de93c64ce05dac1d98138626ffded32950bbc49d8" name="firmware-hdd-8e8ddc5265" arch="x86_64">
    <version epoch="0" ver="HPK2" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-4.1" date="1598270400">-      Added support for RHEL 8.2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-6.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPS1-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1646913600">-      Applied enhanced NAND recovery algorithm to prevent read UECC error
      * Prepare proper response data for Get Message Type Supported MCTP Command</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-4.1" date="1689163200">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="4975944a8ea21157cf2888cdcc61a8e499bee76655222ea44a6ce64fc93d3531" name="firmware-hdd-8ed8893abd" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-8.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="1d85a4dc521658efb7701493a6e8dbc82d59d9d1731fe84f5f62b13c5c9e576a" name="firmware-hdd-8f501d6cf1" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1" date="1640260800">-      Fix command timeout and uncorrectable error improvement.
      * Added features for SAS4 auto power swtiching and thermal requirement.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD1-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1658232000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1658318400">-      FW update to eliminate the risk of data error at unexpected power-off during specific I/O combination.
      * Adjust SoC clock in fw to bridge the LBA info. transfer timing gap and remove the risk of buffer CRC error.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1701172800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1701259200">-      Fix for SAS core dump issue in specific configuration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1708948800">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="e35097f89ff002e2049f8317f22eeca710f20c5498d5e2997b52f647b01f3333" name="firmware-hdd-8f9bf23306" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="9a865610d5422f1d8e395dd8854164df2a8e4d92f322fca28c565436c8c68919" name="firmware-hdd-8fafc9efb2" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1666180800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-4.1" date="1666267200">-      Reduced the occurrence probability of PMIC busy issue. 
      * Fixed the system data error at the drive power on issue. 
      * When the PLP operation starts, the waiting Unmap request to the 4KB not-aligned host write area is canceled to be able to complete PLP correctly.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666612800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666699200">-      Reduced the occurrence probability of PMIC busy issue by stopping PLP capacity check to reduce i2c access to PMIC.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1680264000">-      Reduced the occurrence probability of PMIC busy issue by stopping PLP capacity check to reduce i2c access to PMIC.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1705924800">-      Fix for unrecovered errors which may occur on the targeted Blocks of Wear-leveling process when host issues Read command.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="ccee0ed27d28c93e34a85f244cb4ebb9ba524e188d7d841a4d8c3d4a69de0c2a" name="firmware-hdd-9196d4f720" arch="x86_64">
    <version epoch="0" ver="HPGG" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG" date="1613736000">-      Improvements to Product Quality and Reliability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPGG-6.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="bf9265a085711ca239b809ef368f4ab22bb1ad430c65a1d34ee7ab612302b9fa" name="firmware-hdd-92d876cfea" arch="x86_64">
    <version epoch="0" ver="4ICRHPK3" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-3.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-3.1" date="1632484800">-      The issue affects SSDs with an HPE firmware version prior to 4ICRHPK3 that may result in SSD failure starting at 4,700 hours of operation, neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111900en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-4.1" date="1652529600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-4.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-4.1" date="1652702400">-      The issue affects SSDs with an HPE firmware version prior to 4ICRHPK3 that may result in SSD failure starting at 4,700 hours of operation, neither the SSD nor the data can be recovered, after the SSD failure occurs.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111900en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-7.1" date="1692619200">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-7.1" date="1692705600">-      Fixed CA &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICRHPK3-8.1" date="1704110400">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="9551c908222a30164366b4d7d1b9a72b12c32a9a3d89b71f8291fa4070fd4b91" name="firmware-hdd-9475583fb5" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1680264000">-      Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="6d7ffa4e4b446a3b14ea0439f318270c585546d1efa60bb309b8ead0201aba06" name="firmware-hdd-951aefd63e" arch="x86_64">
    <version epoch="0" ver="MPK7725Q" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-2.1" date="1661256000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-2.1" date="1661342400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-2.1" date="1661428800">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-3.1" date="1666180800">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-3.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-4.1" date="1678363200">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-4.1" date="1678449600">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-5.1" date="1692619200">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7625Q-5.1" date="1692705600">-      Fixed CA &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK7725Q" date="1707998400">-      Fix known FW bug PI/CI indexing issue</changelog>
  </package>
  <package pkgid="cc69823734b5175a953f84f3f85dcefb393ab6c2dfcf4078ccc564afc85f07fe" name="firmware-hdd-95af9a555e" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1661428800">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1689163200">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="a23feaf8157eef680e4c7357854f35a647c81d9a53a1a6d3fe835a16ba5619ba" name="firmware-hdd-9ad359dac1" arch="x86_64">
    <version epoch="0" ver="HPDB" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1616500800">-      Change Vendor Identification Field (VID data) from "HP" to "HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB" date="1705924800">-      Fix for unrecovered errors which may occur on the targeted Blocks of Wear-leveling process when host issues Read command.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="3907578c72b6092d1ec29ba2685d00022be04e163babe233279833bd5e4fb453" name="firmware-hdd-9e87eecb3f" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="2c73067cf34a1828ddd51b1d3d84afa27f616fa7682c606c09618d19e96535aa" name="firmware-hdd-a05f29cef3" arch="x86_64">
    <version epoch="0" ver="HPDC" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB" date="1670932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB" date="1671019200">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-2.1" date="1672747200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDB-2.1" date="1672833600">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDC" date="1692705600">-      Optimize sensor reporting to improve failure rate - AFR (Annual Failure Rate) metrics</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDC-2.1" date="1709208000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="2310203a3aac3a2766df7d18e33911b4c5eb1937b91516473d72da9a0e95f26d" name="firmware-hdd-a07a420ed1" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1689940800">-      Fix for V6 Read disturb issue (which might have caused data integrity issue) and other issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1709208000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="2b930d0377a6347b2d647248b13dd178bb81732163faafe78a59f0aec2523b83" name="firmware-hdd-a1fd19f9ca" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-10.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="dbb771795e25dfa0b2842157258e08e112eb4c050826fa1dd785df35d704fe06" name="firmware-hdd-a27c95663d" arch="x86_64">
    <version epoch="0" ver="HPK5" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1671451200">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1671537600">-      Added Relaxed Ordering feature in drive FW and fixed some bugs</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1674820800">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1674907200">-      Added Relaxed Ordering feature in drive FW and fixed some bugs</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1674993600">-      Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1675080000">-      This component provides support only for VMD enabled Intel VROC platform.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1675166400">-      Added Relaxed Ordering feature in drive FW and fixed some bugs</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4" date="1692705600">-      Fix bugs found in the previous version and improve on TTR (Time To Ready) requirement to fix device temporarily not found issue after hot-plug.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK5" date="1707998400">-      Prioritize disabling Non-Fatal Error reporting at the beginning of FLR processing
      * Fix known FW bug PI/CI indexing issue</changelog>
  </package>
  <package pkgid="74a0fc1f73f576cee9ec1b4dba74af5635c0b0f573e15cf59e932a88369ce137" name="firmware-hdd-a886842a99" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1626350400">-     Reliability enhancements and VENDOR IDENTIFICATION field change from "HP" to
    HPE".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations. 
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-6.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="f89c658f37c58e81bb4618d5d63aba06982ad4469892d06bc60a3ae247f0dda5" name="firmware-hdd-a9843986b0" arch="x86_64">
    <version epoch="0" ver="HPK2" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2" date="1661428800">-      Fix for BIOS RSOD issue</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1681300800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-2.1" date="1681387200">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK2-3.1" date="1689249600">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="af7442b186f4c4ceb33d941e8a2b8091256b335385f25c02b1a5eb81b537f1f7" name="firmware-hdd-aa9e289524" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="61a3fd6a564a5dcc47be1f459d33cba12264b9b556122e1856e34b2215e1da07" name="firmware-hdd-aaf1014ede" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="163c0d1768f0a0d2ba770bf7e650d8ba2a75a7b3474e4fb804b384a16d6a005d" name="firmware-hdd-abd133f0de" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1" date="1680264000">-      Fix contains optimization to increase the time for Recovery operation and few checks for maintenance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-2.1" date="1689249600">-      High Security Enablement support FIPs</changelog>
  </package>
  <package pkgid="dfa3f5c105e1a2171806d67c3944291526261ad6e5eeeb60cb03a176b51894d7" name="firmware-hdd-adb3ab8147" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664366400">-      Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670932800">-      Fixes an issue in previou version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1680264000">-      Fixes an issue in previou version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="a72df358eea0d4bef7dd8b6d500f0a62fece6907dc902a762267eac7319499bf" name="firmware-hdd-ae6b41e855" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664366400">-      Fixes an issue in previou version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1670932800">-      Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1680264000">-      Fixes an issue in previous version where the Inquiry model number is reported incorrectly for first few seconds after the drive is powered on</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-4.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="c927a157d1a6f28f825be90f0508c98cb2c49bd6618bd0cdd8628d6644c8102e" name="firmware-hdd-aef2a690c9" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-5.1" date="1614772800">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1632484800">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1652702400">-      Fixes a rare link loss issue and adds enhancements for drive reliability.
      * After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.
      * The new drive bootloader code will be activated after the next drive power cycle.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-9.1" date="1689163200">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="750e5efd2f817d7d992db18ff39d91ec8a288e782570047c9aafeba0ce71ac22" name="firmware-hdd-b04257b77b" arch="x86_64">
    <version epoch="0" ver="HPDA" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1624536000">-     This firmware version updates the Vendor ID in the standard inquiry to 'HPE',
    in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1661428800">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-3.1" date="1689163200">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="2235aa9fd9c75ef1ddab87b8f6b0ef425e0772f63e6531480b97776ec0385e2d" name="firmware-hdd-b04df66fe9" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1658232000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1658318400">-      Removed printed circuit board assembly serial number from product serial number field on VPD 80h</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1689249600">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="df2c94b8a6e3cc94f429fc16acafa7b8891c62b549757f98f9f4c62989f55b7e" name="firmware-hdd-b1c9eaf74c" arch="x86_64">
    <version epoch="0" ver="HPDA" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1666180800">-      Firmware adds support for new humidity sensor</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1670932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA" date="1671019200">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1672747200">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-2.1" date="1672833600">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPDA-3.1" date="1689076800">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="84e9045d880a107b4adcf91d8500046ef693792f603498742b1ea84bba54a045" name="firmware-hdd-b45e49679c" arch="x86_64">
    <version epoch="0" ver="HPK4" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-9.1" date="1680177600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK4-10.1" date="1689336000">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="bf11015459094e216dab94e349966c9d0c36d991b078689c25d73e595e22976f" name="firmware-hdd-b460823f70" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="73db28ccd121fd4848715957177e3651d23f2735eaeb91810a14cb0a00cd8dfd" name="firmware-hdd-b78255e146" arch="x86_64">
    <version epoch="0" ver="HPG8" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8" date="1666180800">-      Fix for potential hangs and timeouts, tuning fixes based on field experience and maintenance logging items</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-2.1" date="1680264000">-      Fix for potential hangs and timeouts, tuning fixes based on field experience and maintenance logging items</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-3.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="49e5eb5117a98b8c4002756bb31c2dac7f0a5b33852227f4ed17ccd044719a68" name="firmware-hdd-b85516c7d2" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-10.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="b229d39d4b57e8e5b42906f3198a75508266f6e7cedb18ecc144e39cfb63b5e7" name="firmware-hdd-b8a60fbe9a" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="9.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-4.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-8.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-9.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="ea06a6348046282fff77434220256bc8eea89ee1b4bc66baf0125f4925377a0a" name="firmware-hdd-b9340d29be" arch="x86_64">
    <version epoch="0" ver="HPD6" rel="13.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-8.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-9.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-10.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-11.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-12.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-12.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-13.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="f266106959bbcd63e9c73e799eda55602b2211694c8376ab51d65db7988d51f9" name="firmware-hdd-bdfb8e99d9" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6" date="1647864000">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD6-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666094400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7" date="1666180800">-      Firmware adds support for new humidity sensor</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1670932800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1671019200">-      Fixes the Power Coordination algorithm which ensures the drive will properly negotiate power with SPL-2 and newer compliant controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1689076800">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="60acbecede4dc01f59717da89dfa524398b40c4b184646384f95b34048522278" name="firmware-hdd-befd42bd64" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1679745600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG2-5.1" date="1679832000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1679918400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1680004800">-      Improve the FW about data mismatch after SPL</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="9a6148ba29d5c844f25938e5dacbe70fcb23d82af25d4310601230d7d2308781" name="firmware-hdd-bfc4af697b" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-8.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-10.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="94d6fa1c9d22badb96d318e797a2c6391e68ded994a8ef7f34e46e0bff703de9" name="firmware-hdd-c4355d15c4" arch="x86_64">
    <version epoch="0" ver="4ICSHPK4" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-4.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-6.1" date="1680177600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-7.1" date="1692619200">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-7.1" date="1692705600">-      Fixed CA &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 4ICSHPK4-8.1" date="1704110400">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="3c1a30fe293f5be2076804199f79644f1f02b4cbd43a3b16170c0ae8939d2c5b" name="firmware-hdd-c566d63ca0" arch="x86_64">
    <version epoch="0" ver="HPG7" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-6.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-7.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7" date="1682337600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7" date="1682424000">-      Fixes a false indication of rare capacitor test failure</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG7-2.1" date="1689336000">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * High Security Enablement support FIPs.</changelog>
  </package>
  <package pkgid="66b7c3c28af53becd4673ae41929730636a89af9235a21c1ba34a2942ca2002c" name="firmware-hdd-c5cd837c29" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1617019200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="2832fc75e428e3978f66147ef9378db3bfd632faa9fa945f99e21bc5fd300cee" name="firmware-hdd-c7df7ceedb" arch="x86_64">
    <version epoch="0" ver="HPD8" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664366400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8" date="1664452800">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-2.1" date="1680264000">-      Provides proactive protection against contamination built up on the media and air-bearing surface of the heads by increased routine "sweeping" of the media surface.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD8-3.1" date="1689422400">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="5812cff96cc26b991fa07cd010dc2d71b899159dbb9fe6d744366e03f79e84cd" name="firmware-hdd-c993b31232" arch="x86_64">
    <version epoch="0" ver="HPG6" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5" date="1661428800">-      Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1666008000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode  is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6" date="1666094400">-      Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer - Improve random mix performance in TL=2048k and 512k</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-2.1" date="1680264000">-      Improvement in mixed READ/WRITE performance, which was causing a field issue at an HPE customer - Improve random mix performance in TL=2048k and 512k</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG6-3.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="02adb4dda5e131242f2074ce5274055ad6c9bdd5308fcef49ef4227cf1d9c922" name="firmware-hdd-ca21e169e2" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-5.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="b5233767c3dd76d9bb1eb9f733094baf603725a43b5c43ccb8ac5d99877a111c" name="firmware-hdd-cc819d4bff" arch="x86_64">
    <version epoch="0" ver="HPG5" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-6.1" date="1614772800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-7.1" date="1632484800">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-8.1" date="1652702400">-      This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG5-10.1" date="1689163200">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="c57977cf9461f2fccece7c1288cfac36b1aafdbc97614b1c4aaf5844f9a768ef" name="firmware-hdd-cea219e4b1" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1614168000">-      Fixed SSD weargauge report error issue.
      * Fixed Assign FWState as TR_DONE_ERR at the correct location.
      * Prepare proper response data for Get Message Type Supported MCTP Command.
      * Added code to preserve current feature values cross live firmware update.
      * Allocate 4 bytes instead of 2 bytes for parameter code.
      * Changed the value for NLB equal to NSize -1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1680177600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-7.1" date="1689249600">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="ce855f4bdc6e73de4b051020a8d4cd7fc9ffa6b6ab8ec829f63769a18ef39d14" name="firmware-hdd-cf0b6cabe1" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1664280000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1664366400">-      Addresses a hot plug reporting concern
      * Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1680264000">-      Addresses a hot plug reporting concern
      * Increased the buffer memory size used for sequential write data to resolve performance degradation seen in a RAID60 configuration</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1689249600">-      High Security Enablement support FIPs</changelog>
  </package>
  <package pkgid="3ee5273102511c1aaddb7b0fe14df8fe97efcd4fed4035cd97dc50797bdb1466" name="firmware-hdd-cfd7436fcc" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670846400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager. 
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-5.1" date="1670932800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-7.1" date="1689336000">-      High Security Enablement support FIPs</changelog>
  </package>
  <package pkgid="2e920d1c01e7a48ea64737ece7a6e4f166491c71b6d8f3130664f53fdb299fc5" name="firmware-hdd-d1cf327bc4" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1612008000">-      Improved Product Quality and Reliability. Changed Cap Charge Timeout to 14 seconds from 4 seconds to provide additional time for cap charge in marginal power environment.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="e20bc0f77bf0f8caecd853d6b8bfe079b52eca399c045ee878bc2c146a19ce1e" name="firmware-hdd-d39e7a7e75" arch="x86_64">
    <version epoch="0" ver="HPG1" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc...</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-9.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-10.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG1-11.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="abfc6c66b0e39003213af1d2b4fca03886751bab2d3bcf88b173fd71e79db774" name="firmware-hdd-d4be2aecbb" arch="x86_64">
    <version epoch="0" ver="HPD2" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1658232000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2" date="1658318400">-      Removed printed circuit board assembly serial number from product serial number field on VPD 80h</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1689249600">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="2740dba7fd52b91a3bddbbefcbc563637daf2863a7964262763b94c27ec6d81c" name="firmware-hdd-d550523365" arch="x86_64">
    <version epoch="0" ver="HPD3" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-2.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-3.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-4.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD2-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3" date="1695729600">-      Firmware contains fix for bug that may cause drive to perform self-initiated reset in systems where maximum queue depth of 128 is exceeded.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD3-2.1" date="1708689600">-      High Security Enablement support FIPs</changelog>
  </package>
  <package pkgid="8611a809a1cbe5c625a7a86145075cecafb8fe241eb5fe689c82755d7c5062c3" name="firmware-hdd-d7af557f47" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="bbc9bfd11559119c07e9218065a55c06d5978baef22f54dcd712b08ba2f33707" name="firmware-hdd-db687966b4" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-6.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-7.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-8.1" date="1689336000">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="b1622191707197f24025d44b6e538e52d902a0c9f36a1dcc5fdf00d7463db2b1" name="firmware-hdd-e0171a2936" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1687780800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3" date="1687867200">-      Improves data integrity
      * Decreases possibility of data corruption in certain error and timing conditions
      * Reduces the probability of hangs and provide a minor performance improvement</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1707393600">-      Improves data integrity. 
      * The risk of not upgrading to this firmware is the increased possibility of data corruption in certain error and timing conditions. 
      * Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide a minor performance improvement.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="c93af62e0046becb6d49a09680708973e81cc44dd0bbec3e0eb82bc3950e127b" name="firmware-hdd-e320db791d" arch="x86_64">
    <version epoch="0" ver="MPK77H5Q" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK75H5Q-4.1" date="1652702400">-      Fixed False UECC issue at idle power mode (12.8TB and 15.36TB only).
      * Apply PCLK running PHY option, PLL clock disable can be avoided in lane 0 missing case.
      * Old FW download Blocking.
      * FW is changed off the option of TX data alignment for each lane.
      * FW is changed to clear the interrupt after TLP Complete when PCIe config read operation.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00113342en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q" date="1652875200">-     Please refer to SID8624 wtih the reason that why upgrade requiremnet need to
    be set to Critical</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q" date="1652961600">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-2.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-2.1" date="1661428800">-      Contains critical fix for issue where failure to send MI command completion could result in drive reporting 0GB until power cycled.
      * For more information, refer to HPE Customer Advisory at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00123725en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-4.1" date="1681300800">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-4.1" date="1681387200">-      This component provides support only for VMD enabled Intel VROC platform</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-5.1" date="1692619200">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK76H5Q-5.1" date="1692705600">-      Fixed CA &lt;https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00126514en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; MPK77H5Q" date="1707998400">-      Fix known FW bug PI/CI indexing issue</changelog>
  </package>
  <package pkgid="4638df7a6294867ee9a310170863c4d29770bfd300e9b3260872e4faa9bfe8c0" name="firmware-hdd-e4f147cdd2" arch="x86_64">
    <version epoch="0" ver="HPG4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1678881600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4" date="1678968000">-      This firmware revision improves data integrity and reliability by optimizing adjacent track refresh parameters and management of emergency power loss table structure.
      * The risk of not upgrading to this firmware is the increased possibility of data corruption in emergency power loss events.
      * Several maintenance items are included in this firmware revision that reduce the probability of hangs and provide some minor performance improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG4-2.1" date="1689163200">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="488dbb073bd32822f652ca30c920302b4cfab76d80556b1b15cab69268444505" name="firmware-hdd-e800e8d3b9" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="10.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-7.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-8.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-9.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-10.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="ae4f3626a0bec2b039ca07bb70f23583890fb7c7d29b10b66f4b7d71bbfb8740" name="firmware-hdd-ec908c3650" arch="x86_64">
    <version epoch="0" ver="HPG9" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-7.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-8.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-9.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG8-9.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG9" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG9" date="1661428800">-      Fixes an intermittent issue where the incorrect model number can be reported during spin-up</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG9-2.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG9-2.1" date="1666267200">-      Added support for RHEL 9</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG9-3.1" date="1689163200">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="d4fd3e0a1870c436430558269ad8b638a87e705c1e1d7382f1809df3c1dc88cb" name="firmware-hdd-edf6dcd906" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-5.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode or Host Bus Adapter (HBA) is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-7.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-8.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="dcd675cd79f45d8a2f329687020fc6485e9f5c899bf6d1c19d6835c1ea9c8649" name="firmware-hdd-f0c91d2fe3" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1617019200">-      A low-probability, high severity corner case of sustained outer-diameter activity with emergency power off when heads are at the outer diameter prevented heads from parking/latching properly on a few drives in the field.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1680264000">-     Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="72094f4642ce72744c2d536b93e8074f9acd094d467ea75fae655258b02695d1" name="firmware-hdd-f3faa195ff" arch="x86_64">
    <version epoch="0" ver="HPD7" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-7.1" date="1614772800">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1632312000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1632398400">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-8.1" date="1632484800">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-9.1" date="1652702400">-      Fixes a data integrity risk where stale data is mistakenly used from cache.
      * Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.
      * Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-10.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-10.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD7-11.1" date="1689076800">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="cdba7bd2fe1a46d982a4d3629b41d718d97211a24b87815d1b61a6bbe52f7abb" name="firmware-hdd-f42438de3d" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="11.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1614772800">-      Added support for RHEL 8.3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-9.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-10.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-11.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="836dcca154f58e5455981aaaedd9590dcea7f14ddfb1231fb6d836915b3168f7" name="firmware-hdd-f693ccc138" arch="x86_64">
    <version epoch="0" ver="HPG3" rel="8.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-6.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-7.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPG3-8.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="3ce10a014222f3834da34d88e0f22b6b89bc47a690f8f66241d827ae5dddf8e8" name="firmware-hdd-f6d00bd17e" arch="x86_64">
    <version epoch="0" ver="HPD4" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1616414400">-      There is no compelling reason to update this firmware. Risk is that whoever looks at the Vendor ID in the VPD page will notice that it refers to HP instead of HPE. There is no functional risk if not upgraded.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1680177600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-5.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-6.1" date="1689249600">-      Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="421a5150d9a1ae0fa16aaebb8c7541888ca1a8989c8becafb716d2e60893e540" name="firmware-hdd-fa46c607d6" arch="x86_64">
    <version epoch="0" ver="HPD5" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4" date="1622721600">-      This firmware version updates the Vendor ID in the standard inquiry to 'HPE', in previous versions it was 'HP.'</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632398400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-2.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652616000">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD4-3.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5" date="1661428800">-      Firmware addresses a hot plug reporting concern</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1666180800">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-2.1" date="1666267200">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD5-3.1" date="1689163200">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="6f7602aad82bf61b68f5afd97dc14d9589cae1a8ce1f8a85c0678038dd76fbb5" name="firmware-hdd-faf39e0ff7" arch="x86_64">
    <version epoch="0" ver="HPD9" rel="6.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9" date="1628078400">-     This firmware release provides additional protection against command timeouts.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629806400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629892800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-2.1" date="1629979200">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652529600">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652616000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-3.1" date="1652702400">-      This firmware release provides additional protection against command timeouts.
      * For more information, refer to HPE Customer Bulletin at the following URL: &lt;https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00117258en_us&gt;</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661342400">-      Online firmware flashing of drives attached to a Smart Array controller running in Zero Memory (ZM) mode is NOT supported. Only offline firmware flashing of drives is supported for these configurations.
      * Online drive firmware update available for Smart Array Controllers configured in systems running supported Linux, Microsoft Windows, and VMware environments. All other OSes would require an offline update using the Service Pack for ProLiant and Smart Update Manager.
      * Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-4.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPD9-6.1" date="1689163200">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="daa3cfc1e5a354bda73ef46db007f41300aec58fa1d45d4e719c9cbbd7c440c1" name="firmware-hdd-fe9c474847" arch="x86_64">
    <version epoch="0" ver="HPK3" rel="7.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3" date="1614772800">-      Fixed SSD weargauge report error issue.
      * Fixed Assign FWState as TR_DONE_ERR at the correct location.
      * Prepare proper response data for Get Message Type Supported MCTP Command.
      * Added code to preserve current feature values cross live firmware update.
      * Allocate 4 bytes instead of 2 bytes for parameter code.
      * Changed the value for NLB equal to NSize -1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632398400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-3.1" date="1632484800">-      Added support for RHEL 8.4 and SLES15SP3.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652616000">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc..</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-4.1" date="1652702400">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661342400">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-5.1" date="1661428800">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1680177600">-      Customers who already installed latest firmware version do not need to update to sub version like (B) (C) (D) etc.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-6.1" date="1680264000">-      Added support for RHEL 9.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; HPK3-7.1" date="1689249600">-      Fix component SAS core dump issue which along with NVMe drives behind MR controllers on certain platform flashing.
      * Fix NVMe drive component failed to update problem behind more than 2 MR controllers on certain platform.
      * Fix NVMe drive component which shows wrong behavior message against the flash result.
      * Fix SPP force upgrade flash component problem on certain drive family.
      * Support firmware flash in OS FIPS enabled mode.</changelog>
  </package>
  <package pkgid="206b1de74b6c9afa0c989d167c503e97b034abf2f611d7d52a4a20479de29b1b" name="firmware-iegen10" arch="x86_64">
    <version epoch="0" ver="0.2.3.0" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.1.6.1-3.1" date="1544184000">-     *Important Notes:**
    
    Ver. 0.1.6.1(C) contains updates to the component packaging and is
    functionally equivalent to ver. 0.1.6.1.  It is not necessary to upgrade with
    Revision C if a previous component Revision was used to upgrade the firmware
    to version 0.1.6.1.
    
    **Firmware Dependencies:**
    
    System ROM V1.26 or later  
    
    **Problems Fixed:**
    
    Addressed an issue where the Integrated Lights-Out (iLO) web interface may
    incorrectly report the Innovation Engine is running in a degraded state.
    
    Addressed an issue where memory telemetry data may not be reported properly in
    the Integrated Lights-Out (iLO) web interface or through the HPE RESTful API.
    
    Addressed an issue where the Innovation Engine Firmware flash would fail if a
    previous flash attempt was interrupted and not completed successfully.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.0.11" date="1550059200">-     Added support for Intel Xeon Scalable Performance 3200, 4200, 5200, 6200 and
    8200 series processors.
    
    Added support for HPE system performance monitoring and workload performance
    advisor. This feature also requires Integrated Lights-Out (iLO) firmware
    version 1.40 or later.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.0.11" date="1550145600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where updates to the Intel Server Platform
    Services (SPS) firmware may fail.
    
    **Known Issues:**
    
    This flash component will report the Current Revision of the Innovation Engine
    FW as "n/a" when updating the Innovation Engine FW. This does not affect the
    flash update or impact how the Innovation Engine FW operates.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.1.2-2.1" date="1561982400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for HPE Persistent Memory featuring Intel Optane DC Persistent
    Memory.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.0" date="1585742400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where Processor or Memory temperature
    reporting may not be collected properly by the platform and the system fans
    may be running faster than expected. This issue has been seen occasionally
    after a server reboot and is typically corrected with a subsequent server
    reboot.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.2" date="1623153600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an extremely rare issue where processor or memory temperature
    reporting may stop reporting properly or report a constant reading after
    servers have been operating over an extended period of time without an AC
    power cycle.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.2.3" date="1630065600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Address an issue where Innovation Engine (IE) Firmware may be unresponsive and
    iLO Firmware may report "Update Failed" after flashing the Innovation Engine
    (IE) Firmware via RESTful update.  The flash will have been performed
    successfully, but the system must be reset for IE Firmware to function
    properly.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.3.0" date="1645704000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours. On some systems this could result in a brief drop in CPU utilization or
    network traffic lasting less than a second.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.3.0-3.1" date="1700136000">-     *Important Notes:**
    
    Ver. 0.2.3.0(C) contains updates to the firmware packaging and is functionally
    equivalent to ver. 0.2.3.0. It is not necessary to upgrade with Revision B if
    a previous component revision was used to upgrade the firmware to version
    0.2.3.0.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours. On some systems this could result in a brief drop in CPU utilization or
    network traffic lasting less than a second.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.2.3.0-4.1" date="1710590400">-     *Important Notes:**
    
    Ver. 0.2.3.0(D) contains updates to the firmware packaging and is functionally
    equivalent to ver. 0.2.3.0. It is not necessary to upgrade with Revision D if
    a previous component revision was used to upgrade the firmware to version
    0.2.3.0.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours. On some systems this could result in a brief drop in CPU utilization or
    network traffic lasting less than a second.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="0a89a16980395db9f3fa2fd2df86e9c056637e35d7f3ad6e9ebd136f0b18d2f9" name="firmware-iegen10plus" arch="x86_64">
    <version epoch="0" ver="1.0.0.22" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0.20" date="1623326400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0.22" date="1648641600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0.22-3.1" date="1700136000">-     *Important Notes:**
    
    Ver. 1.0.0.22(C) contains updates to the firmware packaging and is
    functionally equivalent to ver. 1.0.0.22. It is not necessary to upgrade with
    Revision B if a previous component revision was used to upgrade the firmware
    to version 1.0.0.22.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.0.22-4.1" date="1710590400">-     *Important Notes:**
    
    Ver. 1.0.0.22(D) contains updates to the firmware packaging and is
    functionally equivalent to ver. 1.0.0.22. It is not necessary to upgrade with
    Revision D if a previous component revision was used to upgrade the firmware
    to version 1.0.0.22.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Innovation Engine (IE) may improperly reset every 24
    hours.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="c098f66051dda40b7e1aaa3128e68e44ef2975674324963679fe367ba2fae776" name="firmware-ilo5" arch="x86_64">
    <version epoch="0" ver="3.03" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.98" date="1697198400">-      Fixed CloudConnect retry logic to reconnect to iLO once connectivity is resumed
      * Fixed the auto-connect issue if the HPE GreenLake Compute Ops Management (COM) was disabled due to a no-retry</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.99" date="1700136000">-      Gracefully handle multiple boot to UEFI commands in installset
      * Provide update statistics via Redfish for firmware bundle update
      * Redfish includes direct attach backplane in chassis collection
      * Redfish includes downstream backplane in chassis collection
      * Providing granular control on Security Parameters present on Security Dashboard</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.99" date="1700222400">-      Fix has been implemented to show right data in redfish, which includes to suppress additional SetObject name when adapter provides expanded data for GET operation in RDE
      * Excessive event issue is fixed when RDE and DCi coexist on the system on iLO 5 and iLO 6
      * iLO Login page shows the Server as Managed by HPE OneView when actually the Server is in Monitored mode</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00" date="1702555200">-      OpenSSL v1.0.2 in iLO FW is patched with Extended Master Secret support for TLS1.2
      * SNMP GET, GET-NEXT and WALK support added for the following storage controllers on iLO5 
        * HPE MR216i-a Gen10 Plus 
        * HPE MR216i-p Gen10 Plus
        * HPE MR416i-a Gen10 Plus
        * HPE MR416i-p Gen10 Plus 
        * HPE SR932i-p Gen10 Plus
        * HPE SR416i-a Gen10 Plus
        * HPE NS204i-p Gen10 Plus Boot Controller
      * Updated the Eventing mechanism for State Transitions for Security Parameters for Security Dashboard
      * Redfish includes direct attach backplane in Fabric collection
      * Redfish schema amendments for DMTF compliance</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00" date="1702641600">-      Slowness due to continuously polling on timer expiry leading to increased CPU utilization
      * Added timestamp register call before iLO starts VSP logging to file to fix iLO VSP locks-up after an iLO reset if there is output displayed during the iLO reset
      * Firmware update fails through iLO web interface due to loss of network connectivity to iLO. You can now retry after 5 minutes when the network connectivity with iLO is restored
      * PSU firmware upgrade flashing failure for Titanium PSUs</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.01" date="1706443200">-      Addition of new SNMP trap (id# 6146) and Redfish event for runtime Mezzanine card failures on Synergy servers
      * Implemented Reconnect button in iLO UI for enabling customers to manually reconnect to HPE GreenLake for Compute Ops Management
      * Configuration to allow disabling/enabling all weak ciphers and key lengths for SSH and TLS interfaces in Production security mode</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.01" date="1706529600">-     None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.02" date="1709035200">-      Support for BlueField-3 DPU Model B3220 has been added
      * Storage Page enhanced to display storage enclosure, switch and port information in the topology</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.02" date="1709121600">-      Fix for incorrect temperature sensor values and sensor indices reported by iLO SNMP interface
      * Fix for inconsistent physical drive status reported by iLO SNMP interface as compared with iLO GUI or Redfish interfaces
      * Support added for sending iLO AlertMail with TLS enabled, in conformance with RFC3207
      * Fix for configuring one time boot options via in-band and out-of-band IPMI methods
      * Fix for Web User interface being rendered inaccessible after the storage tab is clicked, in a server with large number of drives</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.03" date="1710936000">-     None</changelog>
  </package>
  <package pkgid="5809b64edb3b05262411ae4ca83d2aa61ccd3457dac6679a02481c1993487d95" name="firmware-microservergen10plussps" arch="x86_64">
    <version epoch="0" ver="05.01.04.913" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.208" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623067200">-     See the release document in Download Product Binaries page from Product
    Summary of the firmware product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.303" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2020-24509.
    These security vulnerabilities are documented in Intel Security Advisory
    INTEL-SA-00459.  These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.400" date="1644321600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services (SPS) Firmware provides
    mitigations for SPS security vulnerabilities documented as CVE-2021-0060. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.500" date="1652184000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.600" date="1660046400">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.2 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.700" date="1667908800">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2022.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.804" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.913" date="1691496000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with Intel IPU.2023.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 05.01.04.913-2.1" date="1710590400">-</changelog>
  </package>
  <package pkgid="ec4324db1b31d0da51870f3ae05bcaf6c7995d9f96dc078cc7f20a10d5f649a0" name="firmware-microserverv2gen10plus_me" arch="x86_64">
    <version epoch="0" ver="06.00.03.604" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.200" date="1663329600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.204" date="1667908800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version is in compliance with Intel IPU.2022.3 guidance.
    
    The following vulnerabilities have been addressed in this SPS release:
    CVE-2022-29515. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676289600">-     This version is in compliance with IPU.2023.1 guidance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2022-36794. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.505" date="1691496000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.604" date="1705924800">-</changelog>
  </package>
  <package pkgid="df00aefad105c405bf3ac02836681ded7558c092fc7921f76d21b9f2efc8f6f9" name="firmware-ml30gen10plus_me" arch="x86_64">
    <version epoch="0" ver="06.00.03.604" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.035" date="1646568000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.039" date="1646654400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the System ROM contains updates aligned with the Tatlow PLR2
    BKC WW50.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.200" date="1653566400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the MCTP PCIe devices could not be discovered after
    an SPS firmware update without an AC power cycle. This issue is not unique to
    HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.204" date="1667908800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version is in compliance with Intel IPU.2022.3 guidance.
    
    The following vulnerabilities have been addressed in this SPS release:
    CVE-2022-29515. These issues are not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676289600">-     This version is in compliance with IPU.2023.1 guidance.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.309" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2022-36794. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.505" date="1691496000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 06.00.03.604" date="1705924800">-</changelog>
  </package>
  <package pkgid="30c11d499a19f21d8274100f87f8b840b2ceb003f16ed38cbc516c4de020b844" name="firmware-nic-bcm" arch="x86_64">
    <version epoch="0" ver="2.36.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30.2" date="1688558400">-     This product now supports Red Hat Enterprise Linux 8 Update 5.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.31.0" date="1688644800">-     This product addresses an issue related to the adjustment of code structure on
    corresponding HW material change.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32.3" date="1688731200">-     This product enhances the FW Library to support the second NVRAM type.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32.3" date="1688817600">-     This product correct an issue about the display of BootCode version not
    reflecting current running version after upgrading the adapter firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.33.4" date="1688904000">-     This product removes CCM(Comprehensive Configuration Management) for the
    legacy driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.33.4" date="1688990400">-     This product fixes the intermittent issue of displaying incorrect device
    status under iLO web</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.34.1" date="1690804800">-      This product addressed the disconnection with iLO after switching to Shared Network mode.
      * This product addressed the compatibility of shared memory communication on adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.35.3" date="1699876800">-      This product now supports Red Hat Enterprise Linux 9.2.
      * The product addressed some Broadcom code structure utilization.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.35.3" date="1699963200">-     This product addressed that platform might encounter a POST failure when
    NX1-based controllers and some storage controllers combines.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.36.0" date="1701518400">-</changelog>
  </package>
  <package pkgid="61baeaf90eea5e2b1a60e06dd1253f040dc25edd9bec50d756585480f7a89d98" name="firmware-nic-bcm-nxe" arch="x86_64">
    <version epoch="0" ver="1.19.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.13.0" date="1661774400">-     This product no longer supported of updating FW via Service Pack for Proliant
    on HPE Proliant Gen9 servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.13.50" date="1664625600">-     This product addresses an issue about battery POST error caused by unnecessary
    protocol on Supported Devices of this product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.14.0" date="1670587200">-      This product addresses an issue incorrect reporting on link status of HPE 631FLR-SFP28 Adapter.
      * This product addresses an issue battery POST error caused by unnecessary protocol on Supported Devices of this product.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.15.2" date="1680782400">-      This product enhances bnxtnvm support OTP programming.
      * This product enhances coredump support to dump  cache contents.
      * This product enhances Firmware command line module modularity
      * This product enhances to add support for disabling Overflow detection for CQs (Completion Queues) of RoCE (RDMA over converged Ethernet )
      * This product enhances FW support for QUIC key (Quick UDP Internet Connection) context backing store management
      * This product enhances to add support for PCIe TPH (TLP Processing Hints)</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.15.2" date="1680868800">-      This product correct an issue which not allow the user to configure the multi-function mode option with option value string.
      * This product correct an issue which the performance issue is seen with GRO offload (Generic Receive Offload) enable.
      * This product correct an issue which the Firmware upgrade fails if bnxtnvm uses the default value.  increased the timeout value to sufficient vaule.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.16.2" date="1686744000">-      This product enhances the RDE BEJ encoding for some MessageArgs.
      * This product removes CCM(Comprehensive Configuration Management) for the legacy driver.
      * This product removes Energy-Efficient Ethernet (EEE) from the PHY.
      * This product adds range validation checks to dest_port and dest_port_mask for ntuple commands.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.16.2" date="1686830400">-      This product fixes the issue of incorrect PCIe VF numbers caused by some NCSI queries.
      * This product fixes the RDE error response for certain properties with unsupported input
      * This product fixes the problem of no RDE alert being generated when the link status changes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.17.2" date="1690804800">-      This product addressed the NC-SI passthrough algorithm for some FRU-reading commands from platform side.
      * This product addressed the packet forwarding rule while receiving packet which is bigger than 9600 jumbo size.
      * This product addressed the link failure under FreeBSD OS after changing link speed.
      * This product addressed the failure of bringing up VFs of SRIOV when doing on and off switch.
      * This product addressed adapter not responsive when work under heavy loading with 128 VMs.
      * The product addressed status reporting  of PLDM sensor monitoring with BMC.
      * This product addressed the link-flap after link down or warm boot.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.18.2" date="1698840000">-      This product addressed PFC flood problem when shut down system while running RoCE traffic.
      * This product addressed PCIeVDM communication problem between BMC and NIC after an error recovery.
      * This product addressed the PHY level packet drop.
      * This product addressed the problem of multi-cast traffic gets leaked to unintended functions.
      * This product addressed the reporting mechanism of NCSI max temperature.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.19.0" date="1701345600">-      This product fixed the problem of port Reset command not forcing 10G module to shut down link properly.
      * This product fixed the problem of PFC flood if shutdown the system while running RoCE traffic.
      * This product fixed NC-SI Get NC Capabilities and Settings response MaxPFs value.
      * This product fixed the restriction of PF/VF bar sizes to valid values.
      * This product fixed random Whp-livepatch failure due to out-of-order function.</changelog>
  </package>
  <package pkgid="2c6816e8a5ea1af5a161a5be6352e3ead8a4b0e7e3b98bd23f83945480accf97" name="firmware-nic-bcm-open" arch="x86_64">
    <version epoch="0" ver="2.36.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.31.0" date="1670587200">-     This product addresses an issue the adjustment of firmware read-write commands
    on corresponding OS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32.3" date="1680782400">-     This product enhances the FW Library to support the second NVRAM type.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32.3" date="1680868800">-     This product correct an issue which the Boot Code Version of the Firmware did
    not get updated after upgrading the Firmware.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.33.3" date="1686744000">-      This product removes CCM(Comprehensive Configuration Management) for the legacy driver.
      * This product adds to support HPE MicroServer Gen11</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.33.3" date="1686830400">-      This product fixes the intermittent issue of displaying incorrect device status under iLO web
      * This product fixes the intermittent lost iLO connection with shared networking mode.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.34.1" date="1690804800">-      This product addressed a problem where Reboot Required option was not set after doing firmware update under RBSU.
      * This product addressed the disconnection with iLO after switching to Shared Network mode on BCM5719 OCP3 adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.34.50" date="1692792000">-     This product addresses an issue where the FAN behavior with installed BCM 5719
    1Gb 4p BASE-T OCP Adptr.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.34.70" date="1698235200">-     This product addresses an issue where network loses IP Address Randomly during
    AC/DC cycle and idling.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.35.3" date="1699963200">-      This product addressed abnormal fan behavior when BCM5719 OCP3 installed.
      * This product addressed the failure of IP dispatch when using BCM5719 LOM as shared iLO networking.
      * This product addressed that platform might encounter a POST failure when NX1-based controllers and some storage controllers combines.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.36.0" date="1701518400">-</changelog>
  </package>
  <package pkgid="bd968f213141b145d50e990b22b4c95b70dc85de4d619524aa5e7d6320304e63" name="firmware-nic-cornelis-opa-hfi" arch="x86_64">
    <version epoch="0" ver="1.12.0" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.1" date="1552305600">-     *Changes and New Features in version 1.8.1.0.0 :**
    
      * Added hfi1_eprom **v10_8_0_0_13.**
      * Loader ROM **HfiPcieGen3Loader_1.8.1.0.0.rom** and driver EFI **HfiPcieGen3_1.8.1.0.0.efi** were added.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.0" date="1634472000">-     *No changes and new features in version 1.11.0**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.0" date="1634558400">-     *Fixes included in version 1.11.0:**
    
      * **The following issue has been fixed in Unified Extensible Firmware Interafce (UEFI) ROM: **On some platforms, the hfi1 device was not showing up in BIOS/UEFI boot menus and was not available as a PXE boot device. This was caused by the platform not loading the UEFI driver for the hfi1 adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.12.0" date="1663156800">-     *No changes and new features in version 1.12.0**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.12.0" date="1663243200">-     *Fixes included in version 1.12.0:**
    
      * Fixed race condition between BIOS checking link status and LNI completing which resulted in PXE boot failures.
      * Changed the default behavior of the hfi1_eprom tool to convert the eprom format to version 2, eliminating the need to supply the -N command line argument.
      * Addressed an issue where updating the HfiPcieGen3Loader*.rom file could result in the erasure of HfiPcieGen3Loader*.efi and HFI_TYPE1*.dat files.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.12.0-2.1" date="1665316800">-     *No changes and new features in version 1.12.0**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.12.0-2.1" date="1665403200">-     *Fixes included in version 1.12.0:**
    
      * Fixed race condition between BIOS checking link status and LNI completing which resulted in PXE boot failures.
      * Changed the default behavior of the hfi1_eprom tool to convert the eprom format to version 2, eliminating the need to supply the -N command line argument.
      * Addressed an issue where updating the HfiPcieGen3Loader*.rom file could result in the erasure of HfiPcieGen3Loader*.efi and HFI_TYPE1*.dat files.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.12.0-3.1" date="1710590400">-     *Fixes included in version 1.12.0:**
    
      * Fixed race condition between BIOS checking link status and LNI completing which resulted in PXE boot failures.
      * Changed the default behavior of the hfi1_eprom tool to convert the eprom format to version 2, eliminating the need to supply the -N command line argument.
      * Addressed an issue where updating the HfiPcieGen3Loader*.rom file could result in the erasure of HfiPcieGen3Loader*.efi and HFI_TYPE1*.dat files.</changelog>
  </package>
  <package pkgid="26c392f78a0c1a60d0d8bae11d676a08b61e028ace597adfafdd17b245b24e51" name="firmware-nic-intel" arch="x86_64">
    <version epoch="0" ver="1.29.0" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.35" date="1657886400">-     This product addresses a issue where IGMP2 packets isn't forwarded to the host
    OS when shared NIC is enabled with HPE Ethernet 1Gb 2-port 361i Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24.3" date="1661342400">-     This product addresses a issue where Firmware version isn't displaed in NIC
    HII menu</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27.0" date="1679400000">-      This product addresses an issue where Option ROM version is missing with some Intel 1GB adapters
      * This product addresses an issue where disconnection occurs after rebooting system with HPE Ethernet 1Gb 2-port 368i Adapter and HPE Ethernet 1Gb 4-port 369i Adapter</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27.30" date="1679486400">-     This product addresses an issue where NIC status(iLO page-&gt;System
    Information-&gt;Network) for HPE Ethernet 10Gb 2-port 562SFP+/562FLR-SFP+ Adapter
    is Unknown with being plugged in to a network.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27.30-2.1" date="1688385600">-     This product adds the compatibility with Red Hat Enterprise Linux 7.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27.30-2.1" date="1688472000">-     This product addresses an issue where NIC status(iLO page-&gt;System
    Information-&gt;Network) for HPE Ethernet 10Gb 2-port 562SFP+/562FLR-SFP+ Adapter
    is Unknown with being plugged in to a network.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.28.0" date="1689681600">-     This product now supports Red Hat Enterprise Linux 9 Update 1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.28.0" date="1689768000">-     This product addresses an issue where the firmware installation exceeds the
    expected time by using Oneview to update Firmware with 568FLR-MMSFP+.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.29.0" date="1698840000">-     This product enhanced the compatibility with the latest drivers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.29.0-2.1" date="1708257600">-</changelog>
  </package>
  <package pkgid="9f715fd3c4ef97146a68100f78f6fcb18e1b58dbd5e22ada6e92b631633ac33e" name="firmware-nic-is-intel" arch="x86_64">
    <version epoch="0" ver="1.29.0" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.5" date="1631793600">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.50" date="1639137600">-      This product addresses an issue where the incorrect translation is seen with Intel Intel I350-T4 Ethernet 1Gb 4-port BASE-T  Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.24.4" date="1661342400">-     This product now supports HPE ProLiant MicroServer Gen10 Plus v2</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.25.4" date="1665489600">-     This product now supports HPE ProLiant Gen11 servers</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.25.4" date="1665576000">-     This product addresses an issue where the adaters isn't recongized with HPE
    Ethernet 10Gb 2-port SFP+ OCP3 X710-DA2  Adapter and HPE Ethernet 10Gb 2-port
    SFP+ X710-DA2 Adapter</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.26.0" date="1670241600">-     This product now supports HPE ProLiant Gen11 Platforms with Intel processors</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27.30" date="1679486400">-     TBD</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.28.0" date="1689768000">-     This product now supports Red Hat Enterprise Linux 9 Update 1.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.29.0" date="1698840000">-     This product enhanced the compatibility with the latest drivers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.29.0-2.1" date="1708171200">-</changelog>
  </package>
  <package pkgid="ee21d943d2ef5e9ae5db5bf29ab752a5a55ce3a7e7e1bd269b676b04126438e0" name="firmware-nic-mellanox-eth-only-mft" arch="x86_64">
    <version epoch="0" ver="1.0.6" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.3" date="1601985600">-     *Following issues have been fixed in version 14.27.4000:**
    
      * An issue that caused the sent packet to hang while the device entered FLR mode.
      * Enabled Bar configuration bytewise by applying the write_en bitmask.
      * A rare case where the the device froze while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance while using the VSC to trigger the send_ring_doorbells.
      * An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.
      * An issue that caused the fragmented IP packets to drop was fixed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1614254400">-     *Firmware for the following device is updated to 14.28.1002:**
    
    P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **Following New features and Changes are included in version 14.28.1002:**
    
      * Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN 
        * PCI CAP
        * AUTO_POWER_SAVE_LINK_DOWN
      * Added the following segments, as appeared in the PRM, to the Resource Dump: 
        * PRM_QUERY_QP
        * PRM_QUERY_CQ
        * PRM_QUERY_MKEY
        * QUERY_VNIC_ENV</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4" date="1614340800">-     *Following issues have been fixed in version 14.29.1016:**
    
      * An issue that caused the sent packet to hang while the device entered FLR mode.
      * Enabled Bar configuration bytewise by applying the write_en bitmask.
      * A rare case where the the device froze while running the sw reset flow under heavy stress and with many open resources.
      * Low PXE performance while using the VSC to trigger the send_ring_doorbells.
      * An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.
      * An issue that caused the fragmented IP packets to drop was fixed.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632657600">-     *Firmware for the following device is updated to 14.31.1014:**
    
      * P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **New features and changes included in version 14.31.1014:**
    
      * Implemented a new NC-SI command get_debug_info to get mstdump via the NC-SI protocol to debug a device if the PCI link fails for any given reason.
      * support for Enabling/Disabling NIC and RDMA (port/partition) was included via the UEFI HII system settings.
      * Increased the maximum number of MSIX per VF to 127.
      * Added a new bit ("data_in_order") to query the QP and allow a process/library to detect when the AR is enabled.
      * A new flex parser to support GENEVE hardware offload and ICMP.
      * When the non-page-supplier-FLR funcion is initiated, the firmware triggers a page event to the page supplier to indicate that all pages should be returned for the FLR function.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.5" date="1632744000">-     *Following issues have been fixed in version 14.31.1014:**
    
      * TX PRBS was not changed even after reconfiguring it, all PRBS mode were enabled in test mode.
      * A fatal error occurred and eventually resulted in the HCA to get into an unresponsive state when a packet was larger than a strided receive WQE that was being scattered.
      * The resource number size (a 64 bit number) was overwritten with a 32 bit number and erased the high bits when de-allocating the resource number.
    
    **Additional Fixes included in version 14.31.1014:**
    
      * Fixed the rate select mechanism in QSFP modules.
      * Fixed classification issues for "Passive" cables to be more robust.
      * Initialized the rate table in the static configuration so it will be configured at the link-not-up scenarios.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1647777600">-     *Firmware for the following device has been updated to 14.32.1010:**
    
      * P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1647864000">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6-2.1" date="1663156800">-     *Firmware for the following device has been updated to 14.32.1010:**
    
      * P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6-2.1" date="1663243200">-     *The following changes have been made in sub-version 1.0.6(A):**
    
      * Product rebuilt to have the new SHA 384 signature.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6-3.1" date="1709208000">-     *The following changes have been made in sub-version 1.0.6(B):**
    
      * Product rebuilt to support FIPS mode enabled OS environment.
    
    **The following changes have been made in sub-version 1.0.6(A):**
    
      * Product rebuilt to have the new SHA 384 signature.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.</changelog>
  </package>
  <package pkgid="b34338fe0c33188da564037e0f9f88ffc2bdd929a3d02ed7c96f8c2268d6d114" name="firmware-nic-mellanox-ethernet-only" arch="x86_64">
    <version epoch="0" ver="1.0.20" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.16" date="1647864000">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.17" date="1663156800">-     *Firmware for the following devices has been updated to 2.42.5044 :**
    
      * 779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)
      * 779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices has been updated to 14.32.1010:**
    
      * 817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
      * 817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device has been updated to 16.33.1048:**
    
      * 874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.17" date="1663243200">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.33.1048:**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.18" date="1670155200">-     *Firmware for the following devices has been updated to 2.42.5044 :**
    
      * 779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)
      * 779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices has been updated to 14.32.1010:**
    
      * 817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
      * 817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device has been updated to 16.34.1002:**
    
      * 874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.34.1002:**
    
      * Added LLDPEnable, LLDPTransmit and LLDPReceive properties to the RDE Port schema implementation.
      * Added "Command Unsupported" response code in cases when running the MCTP control command "Get Vendor Defined Messages Supported", and there were no supported VDMs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.18" date="1670241600">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.34.1002:**
    
      * An issue where set_flow_table_entry failed when aso_flow_meter action was used.
      * A race condition that occured between the duplicate read and QP commands (2RST, 2ERR and Destroy) in the signature that caused the command to hang.
      * When all traffic applications sharing the same combination of &lt;function, priority, side&gt; were rate limited (for example by congestion control), this limit was enforced on other applications with different combinations of &lt;function, priority, side&gt; under the same VL. For example, requestor flows (RDMA-write) were limited to rate X, however, this rate was also enforced on a QP sending RDMA-read responses. This firmware version prevents rate limit enforcement on traffic applications which should not be limited.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.19" date="1680436800">-     *Firmware for the following devices has been updated to 2.42.5044 :**
    
      * 779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)
      * 779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices has been updated to 14.32.1010:**
    
      * 817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
      * 817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device has been updated to 16.35.1012:**
    
      * 874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.35.1012:**
    
      * Added support for copy modify header steering action to/from the UDP field.
      * Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.
      * QoS priority trust default state can now be changed using the new nvconfig below: 
        * QOS_TRUST_STATE_P1
        * QOS_TRUST_STATE_P2
    
    The values that can be used to set the default state are:
    
      * TRUST_PORT
      * TRUST_PCP
      * TRUST_DSCP
      * TRUST_DSCP_PCP</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.19" date="1680523200">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions. 
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.20" date="1694001600">-     *Firmware for the following devices has been updated to 2.42.5044 :**
    
      * 779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)
      * 779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)
    
    **Firmware for the following devices has been updated to 14.32.1010:**
    
      * 817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)
      * 817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)
    
    **Firmware for the following device has been updated to 16.35.3006:**
    
      * 874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.                                                                                                                     
    
    **New features and changes included in version 16.35.3006:**
    
      * Enabled ACS for single port cards.
      * Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.20" date="1694088000">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.20-2.1" date="1709208000">-     *The following issues have been fixed in version 2.42.5044 :**
    
      * An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.
    
    **The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
  </package>
  <package pkgid="5836e8cc8a7092ff64539ae869f619dedc4cea37df8e1b0d9dc424fbfc9788c7" name="firmware-nic-mellanox-ib-cx4-cx5" arch="x86_64">
    <version epoch="0" ver="1.0.13" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1648555200">-     *Fixes in version 12.28.2006:**
    
      * Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.32.1010**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * The system got into an unresponsive state when a peer port went down while using an Optical module.
      * Invalid RNR timeout when trying to set it during the rts2rts_qp transition.
      * A fatal assert 0x81C5 occurred when calling get_vport_mad from the MAD APIs. The firmware was trying to compute the number of vPorts using a global function number. To avoid this issue, the API was updated to remove any assumption on the function number. Note: This issue is affects only IB devices.
      * During events, stress caused the firmware to reset the Arm host of the vPort without sending an event. Thus preventing the software from rearming the vPort as it did not receive any event, and the firmware did not send the event because the vPort had no Arm set.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.
      * An issue related to the sl2vl mad that caused a few msec hiccup in the transmission on an InfiniBand network when the SM sent the sl2vl mad to a node in the cluster.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1663156800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.33.1048:**
    
      * 872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)
      * 872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)
    
    
    
    **New features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    **New features and changes included in version 16.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.11" date="1663243200">-     *Fixes in version 12.28.2006:**
    
      * Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.33.1048**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1680436800">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.35.1012:**
    
      * 872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)
      * 872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)
    
    
    
    **New features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    **New features and changes included in version 16.35.1012:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.12" date="1680523200">-     *Fixes in version 12.28.2006:**
    
      * Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.35.1012**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13" date="1694001600">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.35.3006:**
    
      * 872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)
      * 872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)
    
    
    
    **New features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    **New features and changes included in version 16.35.3006:**
    
      * Enabled ACS for single port cards.
      * Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13" date="1694088000">-     *Fixes in version 12.28.2006:**
    
      * Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13-2.1" date="1695643200">-     *Firmware for the following devices has been updated to 12.28.2006:**
    
      * 843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)  
    
    
    **Firmware for the following devices has been updated to 16.35.3006:**
    
      * 872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)
      * 872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)
    
    
    
    **New features and changes included in version 12.28.2006:**
    
      * Increased the maximum XRQ number to 512.
    
    **New features and changes included in version 16.35.3006:**
    
      * Enabled ACS for single port cards.
      * Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13-2.1" date="1695729600">-     The subversion 1.0.13 (A) of the product has fixed the issue of smart
    component having been built with an incorrect payload.
    
    
    
    **Fixes in version 12.28.2006:**
    
      * Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.13-3.1" date="1710849600">-     The subversion 1.0.13 (A) of the product has fixed the issue of smart
    component having been built with an incorrect payload.
    
    
    
    **Fixes in version 12.28.2006:**
    
      * Fixed an issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR' time-to-live was increased, and the maximum retry timeout was decreased.
      * Increased PHY power consumption limit to 1.5w.
      * Fixed an issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
  </package>
  <package pkgid="b3241b1b6713160e45c4c3f71ac1231e675b0382da2e61067e6ed841a19affd3" name="firmware-nic-open-mellanox-eth-mft" arch="x86_64">
    <version epoch="0" ver="1.0.10" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.6" date="1647864000">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The link status was reported incorrectly and consequently caused the link to go down due to incorrect definition of the RX_LOS polarity in the INI.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * The system could not create more than 128K QPs.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
      * PCIe lane margining capability issues.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1663156800">-     *Firmware for the following devices has been updated to 14.32.1010:**
    
      * P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
      * P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    
    
    **Firmware for the following device has been updated to 16.33.1048:**
    
      * P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.
    
    .  
    
    **New features and changes included in version 16.33.1048:**
    
      * Added pci_rescan_needed field to the MFRL access register to indicate whether a PCI rescan is needed based on the NV configurations issued by the software.  
    Note: If the Keep Link Up NV configuration is changed, phyless reset will be
    blocked.
    
      * Added a new MAD of class SMP that has the attributes hierarchy_Info as defined in the IB Specification and is used to query the hierarchy information stored on the node and the physical port.
      * Added a new register (vhca_icm_ctrl access_reg) to enable querying and limiting the ICM pages in use.
      * Enhanced the XRQ QP error information provided to the user in case QP goes into an error state. In such case, QUERY_QP will provide information on the syndrome type and which side caused the error.
      * Replaced the deprecated NetworkPort schema with Port schema in NIC RDE implementation.
      * Updated the ibstat status reported when the phy link is down. Now QUERY_VPORT_STATE.max_tx_speed of UPLINK will not be reported as 0 anymore.
      * Disabled the option to send SMPs from unauthorized hosts.
      * Enabled the option to modify the ip_ecn field in the packet header in firmware steering.
      * Modified the TX or RX cache invalidation behavior. TX or RX cache invalidation now does not occur automatically but only when the software performs the sync operation using the using sync_steering command.
      * Modified the maximum bulk size per single allocation from "log_table_size - log_num_unisizes", to allocate any range size, to remove limitations that HWS objects such as counters and modify arguments might encounter.
      * Enabled delay drop for hairpin packets. If a hairpin QP is created with delay_drop_en enabled, the feature will be enabled across all GVMIs, based on the delay drop status.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1663243200">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.
    
    
    
    **The following issues have been fixed in version 16.33.1048:**
    
      * Rare lanes skew issue that caused CPU to timeout in Rec.idle.
      * The card occasionally masked some PCIe AER reporting.
      * Incorrect flow of credits blockage that prevented booting during DC cycle test.
      * An issue with BMC medium migration from SMBUS to PCIe, and increased FIFOs to pass large packets in case of the migration.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1670155200">-     *Firmware for the following devices has been updated to 14.32.1010:**
    
      * P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
      * P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    
    
    **Firmware for the following device has been updated to 16.34.1002:**
    
      * P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.  
    
    
    **New features and changes included in version 16.34.1002:**
    
      * Added LLDPEnable, LLDPTransmit and LLDPReceive properties to the RDE Port schema implementation.
      * Added "Command Unsupported" response code in cases when running the MCTP control command "Get Vendor Defined Messages Supported", and there were no supported VDMs.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1670241600">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.  
    
    
    **The following issues have been fixed in version 16.34.1002:**
    
      * An issue where set_flow_table_entry failed when aso_flow_meter action was used.
      * A race condition that occured between the duplicate read and QP commands (2RST, 2ERR and Destroy) in the signature that caused the command to hang.
      * When all traffic applications sharing the same combination of &lt;function, priority, side&gt; were rate limited (for example by congestion control), this limit was enforced on other applications with different combinations of &lt;function, priority, side&gt; under the same VL. For example, requestor flows (RDMA-write) were limited to rate X, however, this rate was also enforced on a QP sending RDMA-read responses. This firmware version prevents rate limit enforcement on traffic applications which should not be limited.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1680436800">-     *Firmware for the following devices has been updated to 14.32.1010:**
    
      * P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
      * P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    
    
    **Firmware for the following device has been updated to 16.35.1012:**
    
      * P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.  
    
    
    **New features and changes included in version 16.35.1012:**
    
      * Added support for copy modify header steering action to/from the UDP field.
      * Enabled ADP timer to allow the user to configure RC or DC qp_timeout values lower than 16.
      * QoS priority trust default state can now be changed using the new nvconfig below: 
        * QOS_TRUST_STATE_P1
        * QOS_TRUST_STATE_P2
    
    The values that can be used to set the default state are:
    
      * TRUST_PORT
      * TRUST_PCP
      * TRUST_DSCP
      * TRUST_DSCP_PCP</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1680523200">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.  
    
    
    **The following issues have been fixed in version 16.35.1012:**
    
      * RDE (Redfish) PATCH operation to LLDPTransmit properties "ManagementAddressIPv4", "ManagementAddressIPv6" and "ManagementAddressMAC" were applied only in the first attempt, but failed in the next.
      * PLDM AEN event receiver media was changed unexpectedly and destination BDF was overridden with garbage when some PLDM packet were received from the SMBus layer.
      * Bad configuration of number of VFs and SFs led to the consumption of too many functions and triggered a FW assert 0x888E. The reduction flows behavior was fixed to ensure the configuration does not exceed the total number of supported functions. 
      * InfiniBand L2 QP could not receive RDMA traffic occasionally.
      * Running with a debug firmware reduced security as if token was applied.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1694001600">-     *Firmware for the following devices has been updated to 14.32.1010:**
    
      * P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)
      * P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)
    
    
    
    **Firmware for the following device has been updated to 16.35.3006:**
    
      * P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)
    
    
    
    **New features and changes included in version 14.32.1010:**
    
      * Added 3 new assert filters (Health buffer, NVlog, FW trace). The assert will be exposed now if its severity level is equal to or above the new filter.
      * Enabled Rate Limit per VM instead of VM-TC. This capability is implemented by adding support to a new Scheduling element type: rate limit elements that will connect to the rate_limit and will share its  rate limit.
      * Added support for asymmetrical VFs per PF. To enable it:PF_NUM_OF_VF_VALID must be true, and PF_NUM_OF_VF to a non-zero value.
      * Limited the external loopback speed to the used module's capabilities.
      * Improved linkup time when using the fast linkup capability.
      * Added support for the slow_restart and slow_restart_idle parameters to enable Zero Touch RoCE capability.  
    
    
    **New features and changes included in version 16.35.3006:**
    
      * Enabled ACS for single port cards.
      * Added vPort counters after creating the LAG demux table to count kernel packets reaching all the PFs participating in the LAG.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10" date="1694088000">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.  
    
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.10-2.1" date="1710936000">-     *The following issues have been fixed in version 14.32.1010:**
    
      * Firmware got into an unresponsive state and caused unexpected behavior when connecting an optical transceiver that support RxLOS and the remote side port was down.
      * The system could not create more than 128K QPs.
      * On rare occasions, the system got into an unresponsive state when a peer port went down while using an Optical module.
      * Packet Pacing rate was used if asymmetric VFs was enabled.
      * Incorrect RNR timeout when trying to set it during the rts2rts_qp transition.
      * Issue with RSS on IPSec flows in ConnectX-4 Lx led to performance degradation. In this scenario, the SPI optimization caused packets from a given host to hash to the same CPU core. The fix was to ignore SPI optimization according to l4_type in ConnectX-4 Lx adapter cards.
      * The GetInventory NC-SI command reported leading 0xf in firmware version when it started with 0.  
    
    
    **The following issues have been fixed in version 16.35.3006:**
    
      * Packet loss that occurred when restarting the transmit. 
      * An issue that prevented RoCE malformed packets (UDP packet with dest_port equal to RoCE well known udp_dport (0x4791)) from being counted on the vport_counter when the function disables RoCE (through MODIFY_NIC_VPORT_CONTEXT command).
      * A memory leakage that occurred when closing connected QPs (Type RC/UC/XRC/DC).
      * Added a missing VLAN strip.</changelog>
  </package>
  <package pkgid="638e3369c2abf8c1fc35d80b4ad4a8690c83cae2bc69d1c8e992fb6b5be57432" name="firmware-nic-qlogic-flq" arch="x86_64">
    <version epoch="0" ver="1.23.50" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.8.12" date="1572609600">-     This product addresses an issue where 2nd port reports "function type:
    disabled" with HPE Ethernet 10Gb 2-port 524SFP+ Adapter.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.9.8" date="1594987200">-      This product corrects the abnormal disconnection of iLO web page while performing under Shared Networking on Flexible-LOM.
      * This product addresses an issue where the HPE Ethernet 10/25Gb 2-port 622FLR-SFP28 adapter and  HPE Ethernet 10/25Gb 2-port 621SFP28 Adapter UMCE (Uncorrectable Machine Check Exception) was followed by Unrecoverable I/O error, Uncorrectable PCI express error on Server and one of the ports suddenly no longer can send or receive traffic.
      * This product addresses an issue where driver doesn't load upon booting up by correct memory relocation.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.10.10" date="1614859200">-     This product contains support PLDM firmware upgrade base improvements.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.11.0" date="1635508800">-     This product addresses an issue where the modification on string format of
    firmware update payload.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.20.1" date="1646395200">-     This product addresses the problem that the MAC being modified after Firmware
    update</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.21.3" date="1661342400">-     This product now supports Red Hat Enterprise Linux 8 Update 6, Liunx 9 and
    SUSE Linux Enterprise Server 15 Service Pack 4.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.22.0" date="1680868800">-     This product addresses an issue where Max Number of Virtual Machine
    Queues/Physical Function shows zero value in AHS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.0" date="1692619200">-     This product enhanced the compatibility with drivers</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.50" date="1700049600">-     This product addresses an issue where BSOD is seen.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.23.50-2.1" date="1708257600">-     This product addresses an issue where BSOD is seen.</changelog>
  </package>
  <package pkgid="16ea04db4ba56932a1e1374df10b56352583c7de0b74e1512b8e90dab3d99c25" name="firmware-nic-qlogic-nx2" arch="x86_64">
    <version epoch="0" ver="2.34.0" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.27.8" date="1594987200">-      This product corrects the display problem of the adapter name under RBSU.
      * This products corrects some issues about the thermal reporting and temperature threadshold control of the adapter.
      * This product addresses an issue where unexpected UMCE(Uncorrectable Machine Check Exception) appeared when powering on the system with NPAR(Network Partitioning) enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.27.50" date="1602244800">-     This product addresses an issue where the Firmware installation failure when
    enabling secure boot under SUSE Linux Enterprise Server 15 SP2.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.6" date="1614859200">-     This product addresses an issue that platform would be randomly waked up by
    WOL packet.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.28.50" date="1627387200">-      **This product addressed the firmware update failure problem which may cause NIC FW corruption.**
      * **This product addressed the firmware update failure problem while the platform secure boot being enabled.**</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.29.2" date="1631793600">-     This product now supports Red Hat Enterprise Linux 8 update 4 and SUSE Linux
    Enterprise Server 15 Service Pack 3</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.30.2" date="1646395200">-      This product addresses a cosmetic change in the adapter configuration page to reflect that DCBx is enabled and as long as LLDP is enabled.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.31.4" date="1661342400">-     This product now supports Red Hat Enterprise Linux 8 Update 6, Liunx 9 and
    SUSE Linux Enterprise Server 15 Service Pack 4</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.32.0" date="1680868800">-     This product synchronizes FW Upgrade Utilitiy version with VMware and Linux
    drivers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.33.1" date="1692619200">-     This product enhanced the compatibility with drivers</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.34.0" date="1702036800">-     This product addresses an issue that FCoE Boot Target issue.</changelog>
  </package>
  <package pkgid="6205736bdd91a45462f5a1297d13ddac56a6e928954bc864118bff27c3bd3064" name="firmware-powerpic-gen10" arch="x86_64">
    <version epoch="0" ver="1.1.4" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-4.1" date="1548936000">-     *Important Notes:**
    
    Ver. 1.0.4 (D) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.4.  It is not necessary to upgrade with Revision (D) if
    a previous component revision was used to upgrade the firmware to ver. 1.0.4.
    
    **Firmware Dependencies:**
    
    Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM version
    1.20 or later
    
    **Enhancements/New Features:**
    
    Added support for Dynamic Power Capping. For proper operation, please ensure
    that Integrated Lights-Out 5 (iLO 5) Firmware version 1.15 and System ROM
    version 1.20 or later are updated on the server.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7" date="1566820800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors. ROM version 2.00 or
    later is required to enable the support. This version of firmware does not
    include any changes for platforms with Intel Processors or AMD EPYC 7001
    Generation Processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7-2.1" date="1583755200">-     *Important Notes:**
    
    Ver. 1.0.7 (B) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (B) if
    a previous component revision was used to upgrade the firmware to ver.
    1.0.7.This is the initial version for HPE Gen10 Plus servers.  
    
    
    **Firmware Dependencies:**
    
    For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is
    required to enable the support. iLO5 version 1.40 or above is required to
    upgrade to this version.
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant
    DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the
    support. This version of firmware does not include any changes for Gen10
    platforms with Intel Processors or AMD EPYC 7001 Generation Processors. iLO5
    version 1.40 or above is required to upgrade to this version.
    
    This is the initial version for HPE Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.7-3.1" date="1612958400">-     *Important Notes:**
    
    Ver. 1.0.7 (C) contains updates to the component packaging and is functionally
    equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (C) if
    a previous component revision was used to upgrade the firmware to ver.
    1.0.7.This is the initial version for HPE Gen10 Plus servers.
    
    **Firmware Dependencies:**
    
    For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is
    required to enable the support. iLO5 version 1.40 or above is required to
    upgrade to this version.
    
    **Enhancements/New Features:**
    
    Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant
    DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the
    support. This version of firmware does not include any changes for Gen10
    platforms with Intel Processors or AMD EPYC 7001 Generation Processors. iLO5
    version 1.40 or above is required to upgrade to this version.
    
    This is the initial version for HPE Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.8" date="1631707200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Fixed an issue of inaccurate temperature readings when the actual temperature
    exceeds 100 C on Proliant Gen10 Plus servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.9" date="1683028800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    For HPE ProLiant Gen10 Plus servers, iLO5 version 2.55 or above is required to
    upgrade to this version.
    
    **Problems Fixed:**
    
    Fixed an issue where the CPU may not restore to original working frequency
    after turning off Power Capping.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.0" date="1689854400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed a rare issue where CPU could become stuck at its lowest working
    frequency when dynamic power capping was enabled on AMD-based systems.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.2" date="1704974400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    For HPE ProLiant Gen10 Plus servers, iLO5 version 2.55 or above is required to
    upgrade to this version.
    
    **Enhancements/New Features:**
    
    Changed certain behaviors to avoid machine power failures when significant
    power consumption devices are introduced.
    
    **Problems Fixed:**
    
    None
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4" date="1706270400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    For HPE ProLiant Gen10 Plus servers, iLO5 version 2.55 or above is required to
    upgrade to this version.
    
    **Enhancements/New Features:**
    
    Changed certain behaviors to avoid machine power failures when significant
    power consumption devices are introduced.
    
    **Problems Fixed:**
    
    None
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-2.1" date="1710590400">-</changelog>
  </package>
  <package pkgid="f43f2c5696be84913a51178725a019772d86024cfa8635b2334633cb0b819216" name="firmware-smartarray-1f19a4a64d" arch="x86_64">
    <version epoch="0" ver="5.15" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.09" date="1622721600">-      Intermittent failures on Smart Carrier authentication</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.10" date="1630929600">-      To make Valid flag is always set to true initially so that CRC check can be performed on initstring partition and test if it is really valid.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.12" date="1652356800">-     Users need to update HPE SAS 12G Expander FW version 5.12 for FW compatibility
    due to a specific SPI flash devices is used on the Expander card. Carry over
    issue resolution with reference SID8638.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.12" date="1652443200">-     1\. In support of Micron 256Mb SPI ROM on the latest Shiner board
    
    2\. Provided a proper downgrade restriction to ensure FW compatibility with
    the latest HW</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.14" date="1655985600">-      Now Shiner Expander firmware boots up successfully at the time of Initialization.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.14" date="1656072000">-     1. Fix intermittent expander/drives missing issue during repeatedly power cycles
      2. Provide a proper downgrade restriction to ensure firmware compatibility with the latest flashes</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.14-2.1" date="1663675200">-     Support SHA384</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.15" date="1683201600">-      Add support of new flash on the latest expander board.
      * Provided a proper downgrade restriction to ensure firmware compatibility with the latest flashes.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.15-2.1" date="1688644800">-      Support HPE ProLiant DL180 Gen10 Server</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.15-3.1" date="1708603200">-</changelog>
  </package>
  <package pkgid="8759a676b7925f024fe91cf5be43031fdbc0dd65e236cec78821bfb28f50650b" name="firmware-smartarray-7b5e8400dd" arch="x86_64">
    <version epoch="0" ver="1.27" rel="3.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27" date="1616414400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27-2.1" date="1663675200">-      Update build environment with SHA384</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.27-3.1" date="1708603200">-</changelog>
  </package>
  <package pkgid="fa37f7f3067e0705cd6353d99c066b33417c8d50dc4b1d7313ecf2ac6a4da511" name="firmware-smartarray-9f082dffb4" arch="x86_64">
    <version epoch="0" ver="1.00" rel="4.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00" date="1526558400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-2.1" date="1540209600">-     *Note:** If version 1.00 was previously installed, then it is not necessary to upgrade to version 1.00 (B).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-2.1" date="1540296000">-      Added support for SUSE Linux Enterprise Server 15 OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-3.1" date="1663675200">-      Update build environment with SHA384</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.00-4.1" date="1708603200">-</changelog>
  </package>
  <package pkgid="97e0f57c59d059da8d762495ddb428ea6cf26485e1ed7b8d865eb8ebb7b868d5" name="firmware-smartarray-f36d4ef431" arch="x86_64">
    <version epoch="0" ver="0.39" rel="5.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.37" date="1616414400">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39" date="1632657600">-     It's the transition version before migrating to newer version 0.39(B). 0.39
    doesn't have any function change or issue fix, just to activate the new
    Product ID naming.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39" date="1632744000">-      It's the transition version before migrating to newer version 0.39(B). 0.39 doesn't have any function change or issue fix, just to activate the new Product ID naming.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39-2.1" date="1632830400">-      Modify Product ID to "A4200 Gen10P LFF" and "A4200 Gen10P SFF" to distinguish the different generation expander backplane.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39-3.1" date="1663675200">-      Update build environment with SHA384
      * Update OS</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39-4.1" date="1698926400">-     Add RHEL9 OS support</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39-4.1" date="1699012800">-     Fix issue for component unable to be displayed on offline SPP</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.39-5.1" date="1708603200">-</changelog>
  </package>
  <package pkgid="54e098efc3b04b99cab0f9123334f6bc23383362b72d2c14039f2f26ec4f1049" name="firmware-smartarray-f7c07bdbbd" arch="x86_64">
    <version epoch="0" ver="6.52" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.00-2.1" date="1651838400">-      Fixed a rare problem where backup power status was incorrectly reporting Charging instead of Failed.
      * Fixed an issue where obsoleted SCSI pass through command fails.
      * Loss of redundant path message is incorrectly reported on logical drive failure with single domain configuration.
      * Fixed an issue where SmartPath may not be used after LUN Reset
      * Fixed a potential controller lockup 0x1BC0 during write then read I/O with drive URE's.
      * Fixed an issue that Apollo 4200 Gen10 plus LFF expander backplanes are not discovered by controller.
      * Fixed an issue that range locked SED failed with reason error erasing RAID metadata during reboot and remains failed after clear configuration.
      * Fixed an issue where the file system may read incorrect data from a degraded RAID 5 or 6 logical drive.
      * Fixed an issue where the file system or application may read incorrect data when a backup power source is discharged completely, and system power loss occurs during a transformation.
      * Fixed an issue where the drive Fault LED is not turned ON when firmware fails a bad HBA drive connected to an expander during device discovery or hot-plug.
      * Fixed an issue of auto-rebuild not starting if two drives fail at the same time on a RAID10 or RAID6 logical drive having only one "Auto-Replace Drives" spare drive.
      * Fixed an issue where the drive Fault LED is turned ON for a few seconds when multiple configured drives are hot removed from a SES enclosure and then hot added
      * Fixed an issue where rebuild did not start after multiple iterations of drive failures.
      * Fixed an issue where the controller might fail to discover devices after a cable is hot-added.
      * Fixed a potential problem of inability to delete a SmartCache write-back logical drive.
      * Fixed an issue where 0x1789 POST message error code is displayed as healthy and there is no information in HII when all logical drives in the controller are offline.
      * Fixed an issue where the last logical drive in an array cannot be deleted in UEFI configuration tool.
      * Fixed an issue where build method is not listed for RAID 6 array creation in UEFI configuration tool.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.32-2.1" date="1663675200">-     For 2022 Sep MSB usage</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.32-3.1" date="1669636800">-      Initial driver release for HPE SR Gen11 storage controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.61" date="1678190400">-      Added support for for Local Key Management SED adapter password.
      * Added support for reporting surface scan metrics for SSA, SSACLI.
      * Added support for improving secure erase time for disks supporting the WRITE SAME command.
      * Added support for a new persistent event log policy that overwrites old events with the most recently occurred events.
      * Added support PLDM firmware update
      * Added support PLDM firmware update for UBM.
      * Enable Redfish Name property of Volume resource which is optional on create. The value is the same as DisplayName property.
      * Report VendorID, ProductID and location informations for enclosure SEPs.
      * Redfish POST request to perform the Drive.Actions.#SecureErase ACTION will be rejected with the extended error message ResourceInUse if the targeted Drive is a SED that is not in the original factory state(OFS).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.61" date="1678276800">-      Fixed an issue where to create RAID 60 on 24 SATA SSDs resulted in controller lockup.
      * Fixed a performance drop issue on RAID 5 logical drives with 50/50 cache ratio on a 256K sequential read workload.
      * Fixed a parity inconsistency after RAID rebuild restarted with a new drive replacement.
      * Fixed an issue where a transforming logical drive fails when the controller is abruptly rebooted after logical drive deletion.
      * Fixed an issue where the logical drive failed during the heal array transformation.
      * Fixed an issue where rebuild does not start on an array with the spare disk.
      * Fixed an issue where the VDM requests were not being serviced in a timely manner when the controller was under high load.
      * Fixed controller lockup during clear configuration after SmartCache logical drive is moved from P-Series to E-Series controller.
      * Fixed an issue where not all permitted values were published to the WriteCachePolicy@Redfish.AllowableValues in VolumeCapabilities.
      * Fixed an issue where the VolumeCapabilities resource can be published with incorrect values for WriteCachePolicy@Redfish.AllowableValues when the controller's battery is charging.
      * Fixed an issue where the ControllerPasswordAccepted Redfish alert was sent with incorrect ControllerPasswordEntered messageId.
      * Fixed an issue where a drive's ServiceLabel is sometimes erroneously published with a leading zero on its Port number.
      * Fixed an issue where Redfish alerts generated early in the boot sequence were not reported to iLO.
      * Fixed an issue where a Redfish Volume create request is erroneously accepted when the request payload contains a WriteCachePolicy value conflicting with the existing cache configuration.
      * Fixed an issue where the ControllerPreviousError alert was sent with incorrect ControllerPreviouseFailure messageId and severity.
      * Fixed an issue where the BatteryCharging alert was sent with an incorrect severity on certain controllers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.61-2.1" date="1680004800">-     For Gen10 DL325 and DL385 servers usage.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.61-3.1" date="1682510400">-     For Patch bundle 3 of September 2022 SPP</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 5.61-4.1" date="1693310400">-     Support Gen10, Gen10 Plus and Gen11 servers</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.22" date="1693396800">-     Initial Release</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 6.52-2.1" date="1708171200">-</changelog>
  </package>
  <package pkgid="b04e79337d74cbf524f38b9e581c2737ffcd963851a086f4d3222f7005f0ec58" name="firmware-spsgen10" arch="x86_64">
    <version epoch="0" ver="04.01.05.002" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381" date="1591617600">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for security vulnerability CVE-2020-0545. This
    issue is not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381-2.1" date="1597924800">-     This image contains the latest Intel Server Platform Services (SPS) Firmware
    which contains mitigations for security vulnerability CVE-2020-0545. This
    issue is not unique to HPE Servers.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.381-2.1" date="1598011200">-     *Important Notes:**
    
    The Ver. 04.01.04.381(B) flash component contains an updated flash image. The
    actual firmware is exactly the same as was delivered with the original ver.
    04.01.04.381 flash component. The previous flash component had an issue that
    caused flashing to intermittently fail. It is not necessary to upgrade with
    Revision B if a previous component Revision was successfully used to upgrade
    the firmware to version 04.01.04.381 or for systems that originally shipped
    with version 04.01.04.381 firmware.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where systems configured with older versions of the Server
    Platform Services (SPS) Firmware, such as version 04.00.00.288 or older, may
    become inoperable after flashing to SPS firmware version 04.01.04.381. This
    releases contains an updated flash component for SPS Firmware 04.01.04.381
    which allows direct flashing from older firmware versions to the latest.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.423" date="1604923200">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2020-8755. This security
    vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This
    issue is not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.505" date="1623153600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This version of the Server Platform Services (SPS) Firmware addresses an issue
    where not all PCIe devices will be managed properly by the system when there
    are more than 16 PCIe devices present in the platform. This would include PCIe
    devices in PCIe slots or NVMe drives. This issue would typically manifest
    itself as iLO Firmware not properly reporting thermals from a device when a
    server was in this heavily loaded configuration.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.601" date="1644321600">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2021.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2021.2 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.804-2.1" date="1660046400">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Addressed an issue where Intel reference systems were observed to
    intermittently fail to power on during extensive reboot testing.  This issue
    has not been reported on HPE servers.  This version of the Intel SPS firmware
    has been released as part of the Intel 2022.2 IPU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.04.901" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.05.002" date="1691496000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.01.05.002-2.1" date="1710590400">-</changelog>
  </package>
  <package pkgid="7d74c0eaadd1710e7a45d88315f1f9e0b7df2d40633059a892162cdc5e44a7b7" name="firmware-spsgen10plus" arch="x86_64">
    <version epoch="0" ver="04.04.04.603" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.053" date="1623326400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.058" date="1626436800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    Added support for Intel Optane Persistent Memory.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.062" date="1644321600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the System ROM contains updates aligned with the INTEL Whitley
    BKC WW52.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.202" date="1660046400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the INTEL PLR3.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.300" date="1676376000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.1 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.500" date="1691496000">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This version is in compliance with IPU.2023.3 guidance.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 04.04.04.603" date="1705924800">-     *Important Notes:**
    
    This version of the Server Platform Services (SPS) Firmware contains updates
    aligned with the Intel Product Update (IPU) version IPU.2024.1 guidance. This
    version of the SPS should be paired with System ROM 2.00 (02/22/2024) or
    later.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the Server Platform Services Firmware provides mitigations
    for security vulnerability documented as CVE-2023-35191. This issue is not
    unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="05cb64dd1f47868b3862b62ed2f865213ba284405a0fd13d06502a2ab2cb0a77" name="firmware-system-a40" arch="x86_64">
    <version epoch="0" ver="3.00_2024_01_26" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661947200">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigations for security vulnerabilities documented as
    CVE-2022-02068. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669809600">-     Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669896000">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-02-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where some Chinese translation is missing from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.E for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code NaplesPI 1.0.0.J for AMD 1st Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where an abnormal MR controller name would display when
    setting the system language to Japanese from RBSU, and then rebooting the
    system.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691496000">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code NaplesPI 1.0.0.K for AMD 1st Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 for AMD 1st Generation EPYC processors, and CVE-2022-23829 and
    CVE-2023-20593 for AMD 2nd Generation EPYC processor. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.84_09-07-2023" date="1695297600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for
    AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code NaplesPI 1.0.0.K for AMD 1st Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where "Restore Manufacturing Defaults" and "Restore
    Defaults" from iLO web did not restore the Secure Boot Status.
    
    Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1707825600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with vulnerability
    fixes in EDK2 NetworkPkg IP stack implementation that is described in the
    address &lt;https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-
    gj7h&gt;.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024-2.1" date="1710590400">-     *Important Notes:**
    
    Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is
    functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to
    upgrade with Revision B if a previous component revision was used to upgrade
    the firmware to version 3.00_01-26-2024.
    
    This version of the System ROM contains updates aligned with vulnerability
    fixes in EDK2 NetworkPkg IP stack implementation that is described in the
    address &lt;https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-
    gj7h&gt;.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="8f9ea338f4f7b28c3bf0e571909721ec7f4a8d6422cc2d33ba74aacc0ef09b39" name="firmware-system-a41" arch="x86_64">
    <version epoch="0" ver="3.00_2024_01_26" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_08-11-2022" date="1661947200">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigations for security vulnerabilities documented as
    CVE-2022-02068. These issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669809600">-     Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_11-17-2022" date="1669896000">-     *Important Notes:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code 100E for AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-02-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where some Chinese translation is missing from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.E for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code NaplesPI 1.0.0.J for AMD 1st Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where an abnormal MR controller name would display when
    setting the system language to Japanese from RBSU, and then rebooting the
    system.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691496000">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code NaplesPI 1.0.0.K for AMD 1st Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 for AMD 1st Generation EPYC processors, and CVE-2022-23829 and
    CVE-2023-20593 for AMD 2nd Generation EPYC processor. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.84_09-07-2023" date="1695297600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for
    AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes an updated revision of the AMD
    reference code for AMD 2nd Generation EPYC processors.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code NaplesPI 1.0.0.K for AMD 1st Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Restore Manufacturing Defaults and Restore Defaults
    from iLO web did not restore the Secure Boot Status.
    
    Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1707825600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with vulnerability
    fixes in EDK2 NetworkPkg IP stack implementation that is described in the
    address &lt;https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-
    gj7h&gt;.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024-2.1" date="1710590400">-     *Important Notes:**
    
    Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is
    functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to
    upgrade with Revision B if a previous component revision was used to upgrade
    the firmware to version 3.00_01-26-2024.
    
    This version of the System ROM contains updates aligned with vulnerability
    fixes in EDK2 NetworkPkg IP stack implementation that is described in the
    address &lt;https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-
    gj7h&gt;.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="c6fad9e606d65d5b6cf972d00f50b6f7598910f05c01b9e2f9407332b65f75de" name="firmware-system-a42" arch="x86_64">
    <version epoch="0" ver="3.00_2024_01_26" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683460800">-     The following options from RBSU will hide if using customized iPXE.
    
     iPXE Script Auto-Start
    
     iPXE Script Verification
    
     iPXE Auto-Start Script Location
    
     Network Location for iPXE Auto-Start Script</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.A for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the "Access Control Service" option under RBSU did
    not work.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691409600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling L1 IO Drop Chain Enable to drop chain write support to avoid
    unexpected timeouts due to under certain conditions, some high-bandwidth PCIe
    devices could fail to complete the transaction.
    
    In System Configuration (RBSU), the option is located under L1 IO Drop Chain
    Enable in Service Option when the system is with AMD 3rd Generation EPYC
    processors.
    
    This setting has the following Redfish properties.
    
    /redfish/v1/systems/1/bios/oem/hpe/service/settings/DropChainedWrite</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691496000">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and
    CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Addressed an issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Addressed an issue where RSOD would occur when entering System Information
    from RBSU under legacy mode.
    
    Addressed an issue where Uncorrectable Machine Check Exception (UMCE) would
    occur due to unexpected completion timeout to cause system not responding.
    Added new System Configuration (RBSU) configuration options that allows
    enabling L1 IO Drop Chain Enable to drop chain write support to avoid
    unexpected timeouts due to under certain conditions, some high-bandwidth PCIe
    devices could fail to complete the transaction.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.84_08-17-2023" date="1693483200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for
    AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-27-2023" date="1699963200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1707739200">-     Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and
    Windows UEFI CA 2023, since the original keys will expire in 2026.
    
    Added the System Configuration (RBSU) option "Boot Options/UEFI Boot
    Settings/Filter Non-bootable Drives" and set to "Auto" by default. This
    setting has the following Redfish property:
    
    /redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1707825600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC
    processors. This revision of the System ROM includes the mitigation for
    security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd
    Generation EPYC processors. This security vulnerability is documented in the
    CVE report site. This issue is not unique to HPE servers. This revision of the
    System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver
    vulnerability documented as CVE-2021-38575. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for security
    vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC
    processors. This security vulnerability is documented in the CVE report site.
    This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the mitigation for NetworkPkg iSCSI
    Dxe driver vulnerability documented as CVE-2021-38575.
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024-2.1" date="1710590400">-     *Important Notes:**
    
    Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is
    functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to
    upgrade with Revision B if a previous component revision was used to upgrade
    the firmware to version 3.00_01-26-2024.
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC
    processors. This revision of the System ROM includes the mitigation for
    security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd
    Generation EPYC processors. This security vulnerability is documented in the
    CVE report site. This issue is not unique to HPE servers. This revision of the
    System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver
    vulnerability documented as CVE-2021-38575. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for security
    vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC
    processors. This security vulnerability is documented in the CVE report site.
    This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the mitigation for NetworkPkg iSCSI
    Dxe driver vulnerability documented as CVE-2021-38575.
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="b3b66c321db5107f0efb66aa79919fedbc78b1cfc8321f6d7c58294e8bcb9f7b" name="firmware-system-a43" arch="x86_64">
    <version epoch="0" ver="3.00_2024_01_26" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683460800">-     The following options from RBSU will hide if using customized iPXE.
    
    iPXE Script Auto-Start
    
    iPXE Script Verification
    
    iPXE Auto-Start Script Location
    
    Network Location for iPXE Auto-Start Script</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.A for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the "Access Control Service" option under RBSU did
    not work.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691409600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling L1 IO Drop Chain Enable to drop chain write support to avoid
    unexpected timeouts due to under certain conditions, some high-bandwidth PCIe
    devices could fail to complete the transaction.
    
    In System Configuration (RBSU), the option is located under L1 IO Drop Chain
    Enable in Service Option when the system is with AMD 3rd Generation EPYC
    processors.
    
    This setting has the following Redfish properties.
    
    /redfish/v1/systems/1/bios/oem/hpe/service/settings/DropChainedWrite</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691496000">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and
    CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Addressed an issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Addressed an issue where RSOD would occur when entering System Information
    from RBSU under legacy mode.
    
    Addressed an issue where Uncorrectable Machine Check Exception (UMCE) would
    occur due to unexpected completion timeout to cause system not responding.
    Added new System Configuration (RBSU) configuration options that allows
    enabling L1 IO Drop Chain Enable to drop chain write support to avoid
    unexpected timeouts due to under certain conditions, some high-bandwidth PCIe
    devices could fail to complete the transaction.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.84_08-17-2023" date="1693483200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for
    AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-27-2023" date="1699963200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1707739200">-     Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and
    Windows UEFI CA 2023, since the original keys will expire in 2026.
    
    Added the System Configuration (RBSU) option "Boot Options/UEFI Boot
    Settings/Filter Non-bootable Drives" and set to "Auto" by default. This
    setting has the following Redfish property:
    
    /redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1707825600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC
    processors. This revision of the System ROM includes the mitigation for
    security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd
    Generation EPYC processors. This security vulnerability is documented in the
    CVE report site. This issue is not unique to HPE servers. This revision of the
    System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver
    vulnerability documented as CVE-2021-38575. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for security
    vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC
    processors. This security vulnerability is documented in the CVE report site.
    This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the mitigation for NetworkPkg iSCSI
    Dxe driver vulnerability documented as CVE-2021-38575.
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024-2.1" date="1710590400">-     *Important Notes:**
    
    Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is
    functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to
    upgrade with Revision B if a previous component revision was used to upgrade
    the firmware to version 3.00_01-26-2024.
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC
    processors. This revision of the System ROM includes the mitigation for
    security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd
    Generation EPYC processors. This security vulnerability is documented in the
    CVE report site. This issue is not unique to HPE servers. This revision of the
    System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver
    vulnerability documented as CVE-2021-38575. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for security
    vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC
    processors. This security vulnerability is documented in the CVE report site.
    This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the mitigation for NetworkPkg iSCSI
    Dxe driver vulnerability documented as CVE-2021-38575.
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="9692c1c5a687dd82c7cebc66203f9717e4ab1bd82f06e8b694fd1af68d5d8925" name="firmware-system-a46" arch="x86_64">
    <version epoch="0" ver="3.00_2024_01_26" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676462400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683460800">-     The following options from RBSU will hide if using customized iPXE.
    
    iPXE Script Auto-Start
    
    iPXE Script Verification
    
    iPXE Auto-Start Script Location
    
    Network Location for iPXE Auto-Start Script</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.A for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the "Access Control Service" option under RBSU did
    not work.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691409600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling L1 IO Drop Chain Enable to drop chain write support to avoid
    unexpected timeouts due to under certain conditions, some high-bandwidth PCIe
    devices could fail to complete the transaction.
    
    In System Configuration (RBSU), the option is located under L1 IO Drop Chain
    Enable in Service Option when the system is with AMD 3rd Generation EPYC
    processors. This setting has the following Redfish properties.
    /redfish/v1/systems/1/bios/oem/hpe/service/settings/DropChainedWrite</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691496000">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and
    CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Addressed an issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Addressed an issue where RSOD would occur when entering "System Information"
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.84_08-17-2023" date="1693569600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for
    AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-27-2023" date="1700049600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1708516800">-     Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and
    Windows UEFI CA 2023, since the original keys will expire in 2026.
    
    Added the System Configuration (RBSU) option "Boot Options/UEFI Boot
    Settings/Filter Non-bootable Drives" and set to "Auto" by default. This
    setting has the following Redfish property:
    
    /redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1708603200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC
    processors. This revision of the System ROM includes the mitigation for
    security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd
    Generation EPYC processors. This security vulnerability is documented in the
    CVE report site. This issue is not unique to HPE servers. This revision of the
    System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver
    vulnerability documented as CVE-2021-38575. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for security
    vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC
    processors. This security vulnerability is documented in the CVE report site.
    This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the mitigation for NetworkPkg iSCSI
    Dxe driver vulnerability documented as CVE-2021-38575.
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230
    CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235
    CVE-2023-45236 CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024-2.1" date="1713182400">-     *Important Notes:**
    
    Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is
    functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to
    upgrade with Revision B if a previous component revision was used to upgrade
    the firmware to version 3.00_01-26-2024.
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC
    processors. This revision of the System ROM includes the mitigation for
    security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd
    Generation EPYC processors. This security vulnerability is documented in the
    CVE report site. This issue is not unique to HPE servers. This revision of the
    System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver
    vulnerability documented as CVE-2021-38575. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for security
    vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC
    processors. This security vulnerability is documented in the CVE report site.
    This issue is not unique to HPE servers.
    
    
    
    This revision of the System ROM includes the mitigation for NetworkPkg iSCSI
    Dxe driver vulnerability documented as CVE-2021-38575.
    
    
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229 CVE-2023-45230
    CVE-2023-45231 CVE-2023-45232 CVE-2023-45233 CVE-2023-45234 CVE-2023-45235
    CVE-2023-45236 CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="9b2bd82d026932c87a44fec45aa8d2df7dd717a9df965f0dec0b928dd6945a42" name="firmware-system-a47" arch="x86_64">
    <version epoch="0" ver="3.00_2024_01_26" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683460800">-     The following options from RBSU will hide if using customized iPXE.
    
    iPXE Script Auto-Start
    
    iPXE Script Verification
    
    iPXE Auto-Start Script Location
    
    Network Location for iPXE Auto-Start Script</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.A for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the "Access Control Service" option under RBSU did
    not work.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691409600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling L1 IO Drop Chain Enable to drop chain write support to avoid
    unexpected timeouts due to under certain conditions, some high-bandwidth PCIe
    devices could fail to complete the transaction.
    
    In System Configuration (RBSU), the option is located under L1 IO Drop Chain
    Enable in Service Option when the system is with AMD 3rd Generation EPYC
    processors. This setting has the following Redfish properties.
    /redfish/v1/systems/1/bios/oem/hpe/service/settings/DropChainedWrite</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691496000">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and
    CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Addressed an issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Addressed an issue where RSOD would occur when entering "System Information"
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.84_08-17-2023" date="1693569600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for
    AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-27-2023" date="1700049600">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1708516800">-     Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and
    Windows UEFI CA 2023, since the original keys will expire in 2026.
    
    Added the System Configuration (RBSU) option "Boot Options/UEFI Boot
    Settings/Filter Non-bootable Drives" and set to "Auto" by default. This
    setting has the following Redfish property:
    /redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1708603200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC
    processors. This revision of the System ROM includes the mitigation for
    security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd
    Generation EPYC processors. This security vulnerability is documented in the
    CVE report site. This issue is not unique to HPE servers. This revision of the
    System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver
    vulnerability documented as CVE-2021-38575. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233
    CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for security
    vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC
    processors. This security vulnerability is documented in the CVE report site.
    This issue is not unique to HPE servers. This revision of the System ROM
    includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability
    documented as CVE-2021-38575. This revision of the System ROM includes the
    mitigation for NetworkPkg PXE IP stack vulnerabilities documented as
    CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233
    CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024-2.1" date="1713182400">-     *Important Notes:**
    
    Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is
    functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to
    upgrade with Revision B if a previous component revision was used to upgrade
    the firmware to version 3.00_01-26-2024.
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC
    processors. This revision of the System ROM includes the mitigation for
    security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd
    Generation EPYC processors. This security vulnerability is documented in the
    CVE report site. This issue is not unique to HPE servers. This revision of the
    System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver
    vulnerability documented as CVE-2021-38575. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233
    CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for security
    vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC
    processors. This security vulnerability is documented in the CVE report site.
    This issue is not unique to HPE servers. This revision of the System ROM
    includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability
    documented as CVE-2021-38575. This revision of the System ROM includes the
    mitigation for NetworkPkg PXE IP stack vulnerabilities documented as
    CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233
    CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="c4a2b8eb8bb143cde71716ff5e163d574510125148b17262709a237c198c162c" name="firmware-system-a48" arch="x86_64">
    <version epoch="0" ver="3.00_2024_01_26" rel="2.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_02-06-2023" date="1676376000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM updates zlib to 1.2.13 which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-37434.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-37434). This security vulnerability
    is documented in the CVE report site.
    
    This revision of the System ROM includes the v1.1.1s openSSL which provides
    mitigation for BIOS security vulnerability documented as CVE-2022-2097.
    
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2097). This security vulnerability
    is documented in the CVE report site.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683460800">-     The following options from RBSU will hide if using customized iPXE.
    
    iPXE Script Auto-Start
    
    iPXE Script Verification
    
    iPXE Auto-Start Script Location
    
    Network Location for iPXE Auto-Start Script</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.A for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the "Access Control Service" option under RBSU did
    not work.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.84_08-17-2023" date="1691236800">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.G for
    AMD 2nd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-27-2023" date="1691323200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.B
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.G for AMD 2nd Generation EPYC
    processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2023-20592 for both AMD 2nd and 3rd Generation EPYC processors. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691409600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling L1 IO Drop Chain Enable to drop chain write support to avoid
    unexpected timeouts due to under certain conditions, some high-bandwidth PCIe
    devices could fail to complete the transaction.
    
    In System Configuration (RBSU), the option is located under L1 IO Drop Chain
    Enable in Service Option when the system is with AMD 3rd Generation EPYC
    processors. This setting has the following Redfish properties.
    /redfish/v1/systems/1/bios/oem/hpe/service/settings/DropChainedWrite</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-31-2023" date="1691496000">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code RomePI 1.0.0.F for
    AMD 2nd Generation EPYC processors. This revision of the System ROM includes
    AMD reference code MilanPI 1.0.0.B for AMD 3rd Generation EPYC processors.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision provides AMD's mitigation for security vulnerabilities for
    CVE-2022-23829 and CVE-2023-20593 for AMD 2nd Generation EPYC processors, and
    CVE-2022-23829 and CVE-2023-20569 for AMD 3rd Generation EPYC processor. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Addressed an issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Addressed an issue where RSOD would occur when entering "System Information"
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1708516800">-     Added new Microsoft secure boot keys, KEK2023, Microsoft UEFI CA 2023 and
    Windows UEFI CA 2023, since the original keys will expire in 2026.
    
    Added the System Configuration (RBSU) option "Boot Options/UEFI Boot
    Settings/Filter Non-bootable Drives" and set to "Auto" by default. This
    setting has the following Redfish property:
    /redfish/v1/systems/1/bios/settings/FilterNonbootableDrive</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024" date="1708603200">-     *Important Notes:**
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC
    processors. This revision of the System ROM includes the mitigation for
    security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd
    Generation EPYC processors. This security vulnerability is documented in the
    CVE report site. This issue is not unique to HPE servers. This revision of the
    System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver
    vulnerability documented as CVE-2021-38575. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233
    CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for security
    vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC
    processors. This security vulnerability is documented in the CVE report site.
    This issue is not unique to HPE servers. This revision of the System ROM
    includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability
    documented as CVE-2021-38575. This revision of the System ROM includes the
    mitigation for NetworkPkg PXE IP stack vulnerabilities documented as
    CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233
    CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_01-26-2024-2.1" date="1711454400">-     *Important Notes:**
    
    Ver. 3.00_01-26-2024(B) contains updates to the firmware packaging and is
    functionally equivalent to ver. 3.00_01-26-2024. It is not necessary to
    upgrade with Revision B if a previous component revision was used to upgrade
    the firmware to version 3.00_01-26-2024.
    
    This revision of the System ROM includes AMD reference code MilanPI 1.0.0.C
    for AMD 3rd Generation EPYC processors. This revision of the System ROM
    includes AMD reference code RomePI 1.0.0.H for AMD 2nd Generation EPYC
    processors. This revision of the System ROM includes the mitigation for
    security vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd
    Generation EPYC processors. This security vulnerability is documented in the
    CVE report site. This issue is not unique to HPE servers. This revision of the
    System ROM includes the mitigation for NetworkPkg iSCSI Dxe driver
    vulnerability documented as CVE-2021-38575. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233
    CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the mitigation for security
    vulnerabilities CVE-2023-31346 and CVE-2023-31347 for AMD 3rd Generation EPYC
    processors. This security vulnerability is documented in the CVE report site.
    This issue is not unique to HPE servers. This revision of the System ROM
    includes the mitigation for NetworkPkg iSCSI Dxe driver vulnerability
    documented as CVE-2021-38575. This revision of the System ROM includes the
    mitigation for NetworkPkg PXE IP stack vulnerabilities documented as
    CVE-2023-45229 CVE-2023-45230 CVE-2023-45231 CVE-2023-45232 CVE-2023-45233
    CVE-2023-45234 CVE-2023-45235 CVE-2023-45236 CVE-2023-45237.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="5b0b41aab2aec1e666ce1db73c0bcd1473641ac4637246cd13d335beb4eaa6ba" name="firmware-system-u30" arch="x86_64">
    <version epoch="0" ver="3.10_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699358400">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699444800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where "Restore Manufacturing Defaults" and "Restore
    Defaults" from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.10_02-22-2024" date="1704542400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SBCE and ECC storm records may disappear from AHS.
    
    Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the
    iSCSI IpAddressType is set to Auto.
    
    Addressed an issue where the server may hang due to an IE function error.
    
    Merged the solutions from EDK2 for vulnerabilities:
    
    \- Buffer overflow in the DHCPv6 client via a long Server ID option
    
    \- Out-of-bounds read when handling a ND Redirect message with truncated
    options
    
    \- Infinite loop when parsing unknown options in the Destination Options
    header
    
    \- Infinite loop when parsing a PadN option in the Destination Options header
    
    \- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
    message
    
    \- Predictable TCP ISNs
    
    \- Use of a Weak PseudoRandom Number Generator
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="2f6eb974869eb1d4d3fa1f68c6244974e47daf216f9120cafbff86127e436bd4" name="firmware-system-u31" arch="x86_64">
    <version epoch="0" ver="3.10_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699358400">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699444800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where "Restore Manufacturing Defaults" and "Restore
    Defaults" from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.10_02-22-2024" date="1704628800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SBCE and ECC storm records may disappear from AHS.
    
    Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the
    iSCSI IpAddressType is set to Auto.
    
    Addressed an issue where the server may hang due to an IE function error.
    
    Merged the solutions from EDK2 for vulnerabilities:
    
    \- Buffer overflow in the DHCPv6 client via a long Server ID option
    
    \- Out-of-bounds read when handling a ND Redirect message with truncated
    options
    
    \- Infinite loop when parsing unknown options in the Destination Options
    header
    
    \- Infinite loop when parsing a PadN option in the Destination Options header
    
    \- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
    message
    
    \- Predictable TCP ISNs
    
    \- Use of a Weak PseudoRandom Number Generator
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="c5b3bf7fdceee4e36bd3f389ce309b4f577e335f3fe8fe17b0687bb32f28db3e" name="firmware-system-u32" arch="x86_64">
    <version epoch="0" ver="3.10_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699358400">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699444800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where "Restore Manufacturing Defaults" and "Restore
    Defaults" from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.10_02-22-2024" date="1704542400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SBCE and ECC storm records may disappear from AHS.
    
    Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the
    iSCSI IpAddressType is set to Auto.
    
    Addressed an issue where the server may hang due to an IE function error.
    
    Merged the solutions from EDK2 for vulnerabilities:
    
    \- Buffer overflow in the DHCPv6 client via a long Server ID option
    
    \- Out-of-bounds read when handling a ND Redirect message with truncated
    options
    
    \- Infinite loop when parsing unknown options in the Destination Options
    header
    
    \- Infinite loop when parsing a PadN option in the Destination Options header
    
    \- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
    message
    
    \- Predictable TCP ISNs
    
    \- Use of a Weak PseudoRandom Number Generator
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="898e8c0025e209c1995b07899262ef11fcd72ff909b8d9f414be56cc1b8288b4" name="firmware-system-u33" arch="x86_64">
    <version epoch="0" ver="3.10_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699358400">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699444800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where "Restore Manufacturing Defaults" and "Restore
    Defaults" from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.10_02-22-2024" date="1704542400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SBCE and ECC storm records may disappear from AHS.
    
    Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the
    iSCSI IpAddressType is set to Auto.
    
    Addressed an issue where the server may hang due to an IE function error.
    
    Merged the solutions from EDK2 for vulnerabilities:
    
    \- Buffer overflow in the DHCPv6 client via a long Server ID option
    
    \- Out-of-bounds read when handling a ND Redirect message with truncated
    options
    
    \- Infinite loop when parsing unknown options in the Destination Options
    header
    
    \- Infinite loop when parsing a PadN option in the Destination Options header
    
    \- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
    message
    
    \- Predictable TCP ISNs
    
    \- Use of a Weak PseudoRandom Number Generator
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="2acc91509f9c0c6b0f7e7981edf8ccb970cdef1a3ba97abc2c29de375ba6b15f" name="firmware-system-u34" arch="x86_64">
    <version epoch="0" ver="3.10_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699358400">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699444800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where "Restore Manufacturing Defaults" and "Restore
    Defaults" from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.10_02-22-2024" date="1704628800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SBCE and ECC storm records may disappear from AHS.
    
    Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the
    iSCSI IpAddressType is set to Auto.
    
    Addressed an issue where the server may hang due to an IE function error.
    
    Merged the solutions from EDK2 for vulnerabilities:
    
    \- Buffer overflow in the DHCPv6 client via a long Server ID option
    
    \- Out-of-bounds read when handling a ND Redirect message with truncated
    options
    
    \- Infinite loop when parsing unknown options in the Destination Options
    header
    
    \- Infinite loop when parsing a PadN option in the Destination Options header
    
    \- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
    message
    
    \- Predictable TCP ISNs
    
    \- Use of a Weak PseudoRandom Number Generator
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="17d3e19ca251800ceceaa1b6880bab2aa39bcccb879514d440052ae87ea6c806" name="firmware-system-u37" arch="x86_64">
    <version epoch="0" ver="3.10_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676894400">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676980800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691409600">-     None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691496000">-     This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site.  This issue is
    not unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699963200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Restore Manufacturing Defaults and Restore Defaults
    from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.10_02-22-2024" date="1707048000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SBCE and ECC storm records may disappear from AHS.
    
    Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the
    iSCSI IpAddressType is set to Auto.
    
    Addressed an issue where the server may hang due to an IE function error.
    
    Merged the solutions from EDK2 for vulnerabilities:
    
    \- Buffer overflow in the DHCPv6 client via a long Server ID option
    
    \- Out-of-bounds read when handling a ND Redirect message with truncated
    options
    
    \- Infinite loop when parsing unknown options in the Destination Options
    header
    
    \- Infinite loop when parsing a PadN option in the Destination Options header
    
    \- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
    message
    
    \- Predictable TCP ISNs
    
    \- Use of a Weak PseudoRandom Number Generator
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="fcbb419c4036ca602aad1e26487fc16ec76b077068f4208f2a9ce86ab7da060d" name="firmware-system-u38" arch="x86_64">
    <version epoch="0" ver="3.10_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676894400">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676980800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699963200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Restore Manufacturing Defaults and Restore Defaults
    from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.10_02-22-2024" date="1707048000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SBCE and ECC storm records may disappear from AHS.
    
    Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the
    iSCSI IpAddressType is set to Auto.
    
    Addressed an issue where the server may hang due to an IE function error.
    
    Merged the solutions from EDK2 for vulnerabilities:
    
    \- Buffer overflow in the DHCPv6 client via a long Server ID option
    
    \- Out-of-bounds read when handling a ND Redirect message with truncated
    options
    
    \- Infinite loop when parsing unknown options in the Destination Options
    header
    
    \- Infinite loop when parsing a PadN option in the Destination Options header
    
    \- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
    message
    
    \- Predictable TCP ISNs
    
    \- Use of a Weak PseudoRandom Number Generator
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="692534008138b265423f39264c9904b81abe60f7f5db420310ce290631fb0e12" name="firmware-system-u39" arch="x86_64">
    <version epoch="0" ver="3.10_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699358400">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699444800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where "Restore Manufacturing Defaults" and "Restore
    Defaults" from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.10_02-22-2024" date="1705320000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SBCE and ECC storm records may disappear from AHS.
    
    Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the
    iSCSI IpAddressType is set to Auto.
    
    Addressed an issue where the server may hang due to an IE function error.
    
    Merged the solutions from EDK2 for vulnerabilities:
    
    \- Buffer overflow in the DHCPv6 client via a long Server ID option
    
    \- Out-of-bounds read when handling a ND Redirect message with truncated
    options
    
    \- Infinite loop when parsing unknown options in the Destination Options
    header
    
    \- Infinite loop when parsing a PadN option in the Destination Options header
    
    \- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
    message
    
    \- Predictable TCP ISNs
    
    \- Use of a Weak PseudoRandom Number Generator
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="e4d9cbe00bc67aa891b0ff867489e46991d96874abedcab39a651507f4c62e7d" name="firmware-system-u40" arch="x86_64">
    <version epoch="0" ver="3.10_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699358400">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699444800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where "Restore Manufacturing Defaults" and "Restore
    Defaults" from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.10_02-22-2024" date="1705320000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SBCE and ECC storm records may disappear from AHS.
    
    Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the
    iSCSI IpAddressType is set to Auto.
    
    Addressed an issue where the server may hang due to an IE function error.
    
    Merged the solutions from EDK2 for vulnerabilities:
    
    \- Buffer overflow in the DHCPv6 client via a long Server ID option
    
    \- Out-of-bounds read when handling a ND Redirect message with truncated
    options
    
    \- Infinite loop when parsing unknown options in the Destination Options
    header
    
    \- Infinite loop when parsing a PadN option in the Destination Options header
    
    \- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
    message
    
    \- Predictable TCP ISNs
    
    \- Use of a Weak PseudoRandom Number Generator
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="6565a48658b145943d21a57ae6e193959f8f2fe2df7a332b9e9b066429664632" name="firmware-system-u41" arch="x86_64">
    <version epoch="0" ver="3.10_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667822400">-     Updated Intel Optane Memory UEFI driver.
    
    Added support to show manufacturing date for DIMMs in SMBIOS.
    
    Improved the description of Memory Failed Events in the Integrated Management
    Log (IML).</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_09-29-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where a server running the ESXi hypervisor a with TPM
    module installed would halt on loading modules after the installation of the
    hypervisor OS, with the message "TPM log extend failed".
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676289600">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699358400">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699444800">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where "Restore Manufacturing Defaults" and "Restore
    Defaults" from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.10_02-22-2024" date="1704542400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SBCE and ECC storm records may disappear from AHS.
    
    Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the
    iSCSI IpAddressType is set to Auto.
    
    Addressed an issue where the server may hang due to an IE function error.
    
    Merged the solutions from EDK2 for vulnerabilities:
    
    \- Buffer overflow in the DHCPv6 client via a long Server ID option
    
    \- Out-of-bounds read when handling a ND Redirect message with truncated
    options
    
    \- Infinite loop when parsing unknown options in the Destination Options
    header
    
    \- Infinite loop when parsing a PadN option in the Destination Options header
    
    \- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
    message
    
    \- Predictable TCP ISNs
    
    \- Use of a Weak PseudoRandom Number Generator
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="a5fc4d1552185ebd59c944bcbbecc9067f158ad2f829122f78d06b54b11c69ca" name="firmware-system-u43" arch="x86_64">
    <version epoch="0" ver="3.00_2024_02_01" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_04-14-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21125, CVE-2022-21123, CVE-2022-21127,
    CVE-2022-21151, and CVE-2022-0005. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00617 and INTEL-SA-00614. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0154, CVE-2021-0189, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the server may become unresponsive during POST with
    error messages about Unknown Initialization Error and DIMM Initialization
    Error. For more details please read the below advisory:
    https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778 ), CVE-2022-1292
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2068 ) and CVE-2022-2068
    (https://nvd.nist.gov/vuln/detail/CVE-2022-1292). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of Libpng library
    which provides mitigations for security vulnerability documented as
    CVE-2019-7317 (https://nvd.nist.gov/vuln/detail/CVE-2019-7317). This issue is
    not unique to HPE servers.
    
    Removed PCIe bifurcation option in the ROM Based Setup Utility (RBSU) because
    it is not supported through ROM on this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where firmware BootTimer would cause a black screen hang
    when switching TPM 1.2 to 2.0.
    
    Addressed an issue TPM Visibility option in ROM Based Setup Utility (RBSU)
    would be greyed out after upgrading the system ROM from 2.54 to 2.58.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUN. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture defaults.
    
    Addressed an issue where some Chinese and Japaneses translations were missing
    from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-38087. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed an issue where the power-on-password dialog popped up even though
    user did not set a password.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where "Restore Manufacturing Defaults" and "Restore
    Defaults" from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where system might hang while accessing IML log from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_02-01-2024" date="1708171200">-     *Important Notes:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance. This revision of the System
    ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853
    and CVE-2021-38575. This revision of the System ROM includes the revision of
    the OpenSSL library 1.0.2zi update which provides mitigation for security
    vulnerabilities documented as CVE-2023-3817. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237. This version of the System ROM should be paired with Server
    Platform Services (SPS) Firmware 05.01.04.913.
    
    **Firmware Dependencies:**
    
    **Problems Fixed:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance.
    
    This revision of the System ROM includes the mitigation for vulnerabilities
    documented as CVE-2023-45853 and CVE-2021-38575.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zi update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    Addressed an issue where the operating system cannot detect the iSCSI hard
    drive through IPv6 installation if the iSCSI IpAddressType is set to auto.
    
    **Known Issues:**</changelog>
  </package>
  <package pkgid="f6342b72feee173654a1a3cf80426eb1604a37342ab4ab5bae16660ef0052d2b" name="firmware-system-u44" arch="x86_64">
    <version epoch="0" ver="3.00_2024_02_01" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_04-14-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21125, CVE-2022-21123, CVE-2022-21127,
    CVE-2022-21151, and CVE-2022-0005. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00617 and INTEL-SA-00614. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0154, CVE-2021-0189, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778 ), CVE-2022-1292
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2068 ) and CVE-2022-2068
    (https://nvd.nist.gov/vuln/detail/CVE-2022-1292). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of Libpng library
    which provides mitigations for security vulnerability documented as
    CVE-2019-7317 (https://nvd.nist.gov/vuln/detail/CVE-2019-7317). This issue is
    not unique to HPE servers.
    
    Removed PCIe bifurcation option in the ROM Based Setup Utility (RBSU) because
    it is not supported through ROM on this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where firmware BootTimer would cause a black screen hang
    when switching TPM 1.2 to 2.0.
    
    Addressed an issue TPM Visibility option in ROM Based Setup Utility (RBSU)
    would be greyed out after upgrading the system ROM from 2.54 to 2.58.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUN. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture defaults.
    
    Addressed an issue where some Chinese and Japaneses translations were missing
    from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-38087. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed an issue where the power-on-password dialog popped up even though
    user did not set a password.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where "Restore Manufacturing Defaults" and "Restore
    Defaults" from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where system might hang while accessing IML log from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_02-01-2024" date="1708171200">-     *Important Notes:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance. This revision of the System
    ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853
    and CVE-2021-38575. This revision of the System ROM includes the revision of
    the OpenSSL library 1.0.2zi update which provides mitigation for security
    vulnerabilities documented as CVE-2023-3817. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237. This version of the System ROM should be paired with Server
    Platform Services (SPS) Firmware 05.01.04.913.
    
    **Firmware Dependencies:**
    
    **Problems Fixed:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance.
    
    This revision of the System ROM includes the mitigation for vulnerabilities
    documented as CVE-2023-45853 and CVE-2021-38575.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zi update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    Addressed an issue where the operating system cannot detect the iSCSI hard
    drive through IPv6 installation if the iSCSI IpAddressType is set to auto.
    
    **Known Issues:**</changelog>
  </package>
  <package pkgid="a2986e301fb7f82de7521280b0d1b34e5b9ce00e6a69bd1010b9a1c1a5917265" name="firmware-system-u45" arch="x86_64">
    <version epoch="0" ver="3.10_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676894400">-     Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.76_02-09-2023" date="1676980800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-32231 and CVE-2022-26343. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434. This issue is not unique to HPE servers.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    Addressed an issue where some Chinese and Japanese translations were missing
    in RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.78_03-16-2023" date="1680782400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where servers may stop responding during boot when the
    Intel TXT function is enabled.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-38087. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed the issue where the system might hang due to invalid memory free and
    usage when TPM is enabled.
    
    Addressed the issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed the issue where the power-on-password dialog popped up even though
    user did not set the password.
    
    Addressed the issue where the TPM status between RBSU and iLO web pages was
    not synchronized.
    
    Addressed the issue where BIOS does not correctly log memory error data and
    memory health telemetry in AHS.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023" date="1699963200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Restore Manufacturing Defaults and Restore Defaults
    from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023-1.1" date="1704888000">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_10-19-2023-1.1" date="1704974400">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Restore Manufacturing Defaults and Restore Defaults
    from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where BIOS did not report CPU status correctly to iLO, and
    OneView would receive notification when Uncorrectable Machine Check Exception
    (UMCE) occurs.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.10_02-22-2024" date="1707048000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where SBCE and ECC storm records may disappear from AHS.
    
    Addressed an issue where the iSCSI SW IPv6 HDD is not found under OS when the
    iSCSI IpAddressType is set to Auto.
    
    Addressed an issue where the server may hang due to an IE function error.
    
    Merged the solutions from EDK2 for vulnerabilities:
    
    \- Buffer overflow in the DHCPv6 client via a long Server ID option
    
    \- Out-of-bounds read when handling a ND Redirect message with truncated
    options
    
    \- Infinite loop when parsing unknown options in the Destination Options
    header
    
    \- Infinite loop when parsing a PadN option in the Destination Options header
    
    \- Buffer overflow when processing DNS Servers option in a DHCPv6 Advertise
    message
    
    \- Predictable TCP ISNs
    
    \- Use of a Weak PseudoRandom Number Generator
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="13a720bec588fe95dcdead99e644bce37187dfa16921bded570a6063c10ee478" name="firmware-system-u46" arch="x86_64">
    <version epoch="0" ver="2.00_2024_03_06" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where "Reboot Required" radio button isn't highlighted
    after BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676289600">-     Added "Important: Intel(R) NVMe and Intel(R) VROC are not supported when the
    Boot Mode is configured in Legacy BIOS Mode." message into the RBSU help
    description for Intel NVMe VROC option.
    
    Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when "Workload
    Profile" sets to "Custom" and "Power Regulator" sets to "OS Control Mode".
    
    Downgraded several debug messages from DEBUG_ERROR to DEBUG_INFO level.
    Removed unnecessary error messages in BIOS serial log.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683547200">-     Added new System Configuration (RBSU) configuration options that allow user
    input frequency scaling of the processor's internal busses. In System
    Configuration (RBSU), the options is located under "Uncore Frequency Scaling"
    option in "Power and Performance Options". This setting has the following
    Redfish properties.
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMax
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMin
    
    Added new System Configuration (RBSU) configuration options that allow
    disabling Dynamic Loadline switches between EPB modes depending on the P-state
    behavior. Enable or disable the switch could affect the power and performance
    by condition. In System Configuration (RBSU), the options is located under
    "Power and Performance Options". This setting has the following Redfish
    properties.
    
    /redfish/v1/systems/1/bios/settings/DynamicLoadlineSwitch</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system would hang after uploading the Samsung
    1733/1735 U.3 NVMe Drive firmware through FMP.
    
    Addressed an issue where PMEM NUMA nodes were not continuous (3, 5) under 8 8
    isolated NUMA nodes configuration.
    
    Addressed an issue where a drive could not be unmounted when hot-plug
    interrupt was generated during the DPC recovery process, with the event going
    over the DPC threshold.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1691409600">-     Disabled "Total Memory Encryption Multi-Tenant" option in RBSU if "Processor
    Physical Addressing" option was set to "Limited". This is for consistency with
    Intel's reference code behavior.
    
    The path to the option:
    
    Memory Options &gt;Memory Encryption Options &gt;Total Memory Encryption Multi-
    Tenant (TME-MT)
    
    Added Chinese translation for "Intel(R) Speed Select Technology" in RBSU.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505, CVE-2022-40982,
    CVE-2023-23908 and CVE-2022-41804. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where the RBSU "Storage Device Information" was empty when
    VROC is enabled.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address the issue where the TPM status displayed in RBSU and iLO web page was
    not in sync.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering "System Information"
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Added "DMI Power Management (ASPM)" option in RBSU. The option has the default
    value of "disable", which will override default setting of "enable" from the
    previous ROM. This is due to enabling DMI power management might result in
    system hang with machine check exception based on Intel erratum RKL-15.
    
    The path to the option is: Processor Options -&gt; DMI Power Management (ASPM)
    
    This setting has the Redfish property URI of:
    /redfish/v1/systems/1/bios/settings/E3DmiAspm
    
    To follow DMTF schema, change the Redfish registry version naming to have the
    pattern of "^\d+.\d+.\d+$".
    
    For example,
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will
    now becomes
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.4 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2023-23583. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00_03-06-2024" date="1705924800">-     *Important Notes:**
    
    This version of the System ROM should be paired with Server Platform Services
    (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the PCI VPD data would be written unconditionally
    while system is accessing to PCI VPD.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763,
    CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where the UBM version between RBSU and iLO web pages was
    not synchronized.
    
    Addressed an issue where NVME hot plug when installing fully loaded NVME
    drives.
    
    Addressed an issue vulnerabilities in network IP stack documented as from
    CVE-2023-45230 to CVE-2023-45237.
    
    Addressed an issue where the PCIE slot control would disappear in RBSU when
    the PCIE switchboard is installed in the system.
    
    Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when
    iSCSI IP Address Type option is set to "Auto" in RBSU Network Options / iSCSI
    Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address
    Type.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="7f597aa0dbac314849febeec12cbed9dc350c5c60a36936f4c7558e81a94ce4e" name="firmware-system-u47" arch="x86_64">
    <version epoch="0" ver="2.00_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676376000">-     Added "Important: Intel(R) NVMe and Intel(R) VROC are not supported when the
    Boot Mode is configured in Legacy BIOS Mode." message into the RBSU help
    description for Intel NVMe VROC option.
    
    Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when Workload
    Profile sets to Custom and Power Regulator sets to OS Control Mode.
    
    Downgraded several debug messages from DEBUG_ERROR to DEBUG_INFO level.
    Removed unnecessary error messages in BIOS serial log.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676462400">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683460800">-     Added new System Configuration (RBSU) configuration options that allow user
    input frequency scaling of the processor's internal busses. In System
    Configuration (RBSU), the options is located under Uncore Frequency Scaling
    option in Power and Performance Options. This setting has the following
    Redfish properties.
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMax
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMin
    
    Added new System Configuration (RBSU) configuration options that allow
    disabling Dynamic Loadline switches between EPB modes depending on the P-state
    behavior. Enable or disable the switch could affect the power and performance
    by condition. In System Configuration (RBSU), the options is located under
    Power and Performance Options. This setting has the following Redfish
    properties.
    
    /redfish/v1/systems/1/bios/settings/DynamicLoadlineSwitch</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683547200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system would hang after uploading the Samsung
    1733/1735 U.3 NVMe Drive firmware through FMP.
    
    Addressed an issue where PMEM NUMA nodes were not continuous (3, 5) under 8 8
    isolated NUMA nodes configuration.
    
    Addressed an issue where a drive could not be unmounted when hot-plug
    interrupt was generated during the DPC recovery process, with the event going
    over the DPC threshold.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1691409600">-     Disabled "Total Memory Encryption Multi-Tenant" option in RBSU if "Processor
    Physical Addressing" option was set to "Limited". This is for consistency with
    Intel's reference code behavior.
    
    The path to the option:
    
    Memory Options &gt;Memory Encryption Options &gt;Total Memory Encryption Multi-
    Tenant (TME-MT)
    
    Added Chinese translation for "Intel(R) Speed Select Technology" in RBSU.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505, CVE-2022-40982,
    CVE-2023-23908 and CVE-2022-41804. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where the RBSU "Storage Device Information" was empty when
    VROC is enabled.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address the issue where the TPM status displayed in RBSU and iLO web page was
    not in sync.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering System Information from
    RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Added "DMI Power Management (ASPM)" option in RBSU. The option has the default
    value of "disable", which will override default setting of "enable" from the
    previous ROM. This is due to enabling DMI power management might result in
    system hang with machine check exception based on Intel erratum RKL-15.
    
    The path to the option is: Processor Options -&gt; DMI Power Management (ASPM)
    
    This setting has the Redfish property URI of:
    /redfish/v1/systems/1/bios/settings/E3DmiAspm
    
    To follow DMTF schema, change the Redfish registry version naming to have the
    pattern of "^\d+.\d+.\d+$".
    
    For example,
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will
    now becomes
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.4 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2023-23583. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00_02-22-2024" date="1709640000">-     *Important Notes:**
    
    This version of the System ROM should be paired with Server Platform Services
    (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the PCI VPD data would be written unconditionally
    while system is accessing to PCI VPD.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763,
    CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where the UBM version between RBSU and iLO web pages was
    not synchronized.
    
    Addressed an issue where NVME hot plug when installing fully loaded NVME
    drives.
    
    Addressed an issue vulnerabilities in network IP stack documented as from
    CVE-2023-45230 to CVE-2023-45237.
    
    Addressed an issue where the PCIE slot control would disappear in RBSU when
    the PCIE switchboard is installed in the system.
    
    Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when
    iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI
    Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address
    Type.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="374ac718462f06351b4ea290ea3187a46c8422a0a2010df42f70671d40e64209" name="firmware-system-u48" arch="x86_64">
    <version epoch="0" ver="3.00_2024_02_01" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.58_04-14-2022" date="1652184000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel
    microcode which provides mitigations for security vulnerability documented as
    CVE-2022-21166, CVE-2022-21125, CVE-2022-21123, CVE-2022-21127,
    CVE-2022-21151, and CVE-2022-0005. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00617 and INTEL-SA-00614. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of the Intel
    Reference Code which provides mitigations for BIOS advisories and security
    vulnerabilities documented as CVE-2021-0154, CVE-2021-0189, CVE-2021-33123,
    CVE-2021-33124, and CVE-2021-33159. These security vulnerabilities are
    documented in Intel Security Advisory INTEL-SA-00601 and INTEL-SA-00610. These
    issues are not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the ROM Based Setup Utility (RBSU) language setting is non-
    English.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778 ), CVE-2022-1292
    (https://nvd.nist.gov/vuln/detail/CVE-2022-2068 ) and CVE-2022-2068
    (https://nvd.nist.gov/vuln/detail/CVE-2022-1292). This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of FreeType
    library which provides mitigations for security vulnerabilities documented as
    CVE-2022-27404, CVE-2022-27405, and CVE-2022-27406. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of Libpng library
    which provides mitigations for security vulnerability documented as
    CVE-2019-7317 (https://nvd.nist.gov/vuln/detail/CVE-2019-7317). This issue is
    not unique to HPE servers.
    
    Removed PCIe bifurcation option in the ROM Based Setup Utility (RBSU) because
    it is not supported through ROM on this platform.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667822400">-     Added support to show manufacturing date for DIMMs in SMBIOS.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.64_10-13-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    Addressed an issue where firmware BootTimer would cause a black screen hang
    when switching TPM 1.2 to 2.0.
    
    Addressed an issue TPM Visibility option in ROM Based Setup Utility (RBSU)
    would be greyed out after upgrading the system ROM from 2.54 to 2.58.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    Addressed an issue that system will hang when BIOS tries to print a large IML
    message on POST screen.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUN. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture defaults.
    
    Addressed an issue where some Chinese and Japaneses translations were missing
    from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.72_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.2 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-33894 and CVE-2022-38087. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where the PCIe device serial number in OEM SMBIOS type 203
    does not populate in some cases.
    
    Addressed an issue where the power-on-password dialog popped up even though
    user did not set a password.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.80_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zh update which provides mitigation for security vulnerabilities
    documented as CVE-2023-2650.
    
    Addressed an issue where iLO embedded device health info would display blank
    content under RBSU when the Language was set to Japanese or Chinese.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where Restore Manufacturing Defaults and Restore Defaults
    from iLO web did not restore the Secure Boot Status.
    
    Addressed an issue where system might hang while accessing IML log from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 3.00_02-01-2024" date="1708084800">-     *Important Notes:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance. This revision of the System
    ROM includes the mitigation for vulnerabilities documented as CVE-2023-45853
    and CVE-2021-38575. This revision of the System ROM includes the revision of
    the OpenSSL library 1.0.2zi update which provides mitigation for security
    vulnerabilities documented as CVE-2023-3817. This revision of the System ROM
    includes the mitigation for NetworkPkg PXE IP stack vulnerabilities documented
    as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237. This version of the System ROM should be paired with Server
    Platform Services (SPS) Firmware 05.01.04.913.
    
    **Firmware Dependencies:**
    
    **Problems Fixed:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance.
    
    This revision of the System ROM includes the mitigation for vulnerabilities
    documented as CVE-2023-45853 and CVE-2021-38575.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.0.2zi update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    Addressed an issue where the operating system cannot detect the iSCSI hard
    drive through IPv6 installation if the iSCSI IpAddressType is set to auto.
    
    **Known Issues:**</changelog>
  </package>
  <package pkgid="401034a9dff77a3817d7b050a97246282c91d82504cb6ee967df355d8f2bcdc1" name="firmware-system-u50" arch="x86_64">
    <version epoch="0" ver="2.00_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676289600">-     Added "Important: Intel(R) NVMe and Intel(R) VROC are not supported when the
    Boot Mode is configured in Legacy BIOS Mode." message into the RBSU help
    description for Intel NVMe VROC option.
    
    Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when Workload
    Profile sets to Custom and Power Regulator sets to OS Control Mode.
    
    Downgraded several debug messages from DEBUG_ERROR to DEBUG_INFO level.
    Removed unnecessary error messages in BIOS serial log.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683547200">-     Added new System Configuration (RBSU) configuration options that allow user
    input frequency scaling of the processor's internal busses. In System
    Configuration (RBSU), the options is located under Uncore Frequency Scaling
    option in Power and Performance Options. This setting has the following
    Redfish properties.
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMax
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMin
    
    Added new System Configuration (RBSU) configuration options that allow
    disabling Dynamic Loadline switches between EPB modes depending on the P-state
    behavior. Enable or disable the switch could affect the power and performance
    by condition. In System Configuration (RBSU), the options is located under
    Power and Performance Options. This setting has the following Redfish
    properties.
    
    /redfish/v1/systems/1/bios/settings/DynamicLoadlineSwitch</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system would hang after uploading the Samsung
    1733/1735 U.3 NVMe Drive firmware through FMP.
    
    Addressed an issue where PMEM NUMA nodes were not continuous (3, 5) under 8 8
    isolated NUMA nodes configuration.
    
    Addressed an issue where a drive could not be unmounted when hot-plug
    interrupt was generated during the DPC recovery process, with the event going
    over the DPC threshold.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1691409600">-     Disabled "Total Memory Encryption Multi-Tenant" option in RBSU if "Processor
    Physical Addressing" option was set to "Limited". This is for consistency with
    Intel's reference code behavior.
    
    The path to the option:
    
    Memory Options &gt;Memory Encryption Options &gt;Total Memory Encryption Multi-
    Tenant (TME-MT)
    
    Added Chinese translation for "Intel(R) Speed Select Technology" in RBSU.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505, CVE-2022-40982,
    CVE-2023-23908 and CVE-2022-41804. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where the RBSU "Storage Device Information" was empty when
    VROC is enabled.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address the issue where the TPM status displayed in RBSU and iLO web page was
    not in sync.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering System Information from
    RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Added "DMI Power Management (ASPM)" option in RBSU. The option has the default
    value of "disable", which will override default setting of "enable" from the
    previous ROM. This is due to enabling DMI power management might result in
    system hang with machine check exception based on Intel erratum RKL-15.
    
    The path to the option is: Processor Options -&gt; DMI Power Management (ASPM)
    
    This setting has the Redfish property URI of:
    /redfish/v1/systems/1/bios/settings/E3DmiAspm
    
    To follow DMTF schema, change the Redfish registry version naming to have the
    pattern of "^\d+.\d+.\d+$".
    
    For example,
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will
    now becomes
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.4 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2023-23583. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00_02-22-2024" date="1706443200">-     *Important Notes:**
    
    This version of the System ROM should be paired with Server Platform Services
    (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the PCI VPD data would be written unconditionally
    while system is accessing to PCI VPD.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763,
    CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where the UBM version between RBSU and iLO web pages was
    not synchronized.
    
    Addressed an issue where NVME hot plug when installing fully loaded NVME
    drives.
    
    Addressed an issue vulnerabilities in network IP stack documented as from
    CVE-2023-45230 to CVE-2023-45237.
    
    Addressed an issue where the PCIE slot control would disappear in RBSU when
    the PCIE switchboard is installed in the system.
    
    Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when
    iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI
    Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address
    Type.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="e8e8226fc390d41c8755e5d4333eca4dd9cad136e549005f3d3dda86aeabb413" name="firmware-system-u56" arch="x86_64">
    <version epoch="0" ver="2.00_2024_02_22" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_10-27-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel PLR3
    OOB guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel PLR3
    OOB update which provides Intel's mitigation for BIOS advisory and security
    vulnerability documented as CVE-2022-33972. This security vulnerability is
    documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    Addressed an issue where the Boot timer record was increasing incorrectly
    after every warm reboot.
    
    Addressed a possible hang issue when using a newer PCIe device with a very
    high PCI bus requirement.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676289600">-     Added "Important: Intel(R) NVMe and Intel(R) VROC are not supported when the
    Boot Mode is configured in Legacy BIOS Mode." message into the RBSU help
    description for Intel NVMe VROC option.
    
    Added new System Configuration (RBSU) configuration options that allow
    enabling and disabling EPP (Energy Performance Preference) when Workload
    Profile sets to Custom and Power Regulator sets to OS Control Mode.
    
    Downgraded several debug messages from DEBUG_ERROR to DEBUG_INFO level.
    Removed unnecessary error messages in BIOS serial log.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_02-02-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21216, CVE-2022-32231,
    CVE-2022-26343, CVE-2022-33196, CVE-2022-38090 and CVE-2022-33972. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for and security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where the controller name was not displayed in Japanese
    when MegaRAID was switched to Japanese, .
    
    Addressed an issue where NVMe drive info was not displayed properly in iLO
    when Intel PCH VMD is enabled in RBSU.
    
    Addressed an issue where Intel VROC SATA firmware shows N/A under PCI Device
    information.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683547200">-     Added new System Configuration (RBSU) configuration options that allow user
    input frequency scaling of the processor's internal busses. In System
    Configuration (RBSU), the options is located under Uncore Frequency Scaling
    option in Power and Performance Options. This setting has the following
    Redfish properties.
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMax
    
    /redfish/v1/systems/1/bios/settings/UncoreFrequencyMin
    
    Added new System Configuration (RBSU) configuration options that allow
    disabling Dynamic Loadline switches between EPB modes depending on the P-state
    behavior. Enable or disable the switch could affect the power and performance
    by condition. In System Configuration (RBSU), the options is located under
    Power and Performance Options. This setting has the following Redfish
    properties.
    
    /redfish/v1/systems/1/bios/settings/DynamicLoadlineSwitch</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.76_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the system would hang after uploading the Samsung
    1733/1735 U.3 NVMe Drive firmware through FMP.
    
    Addressed an issue where PMEM NUMA nodes were not continuous (3, 5) under 8 8
    isolated NUMA nodes configuration.
    
    Addressed an issue where a drive could not be unmounted when hot-plug
    interrupt was generated during the DPC recovery process, with the event going
    over the DPC threshold.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages was not
    synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1691409600">-     Disabled "Total Memory Encryption Multi-Tenant" option in RBSU if "Processor
    Physical Addressing" option was set to "Limited". This is for consistency with
    Intel's reference code behavior.
    
    The path to the option:
    
    Memory Options &gt;Memory Encryption Options &gt;Total Memory Encryption Multi-
    Tenant (TME-MT)
    
    Added Chinese translation for "Intel(R) Speed Select Technology" in RBSU.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-05-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-43505, CVE-2022-40982,
    CVE-2023-23908 and CVE-2022-41804. This security vulnerability is documented
    in the CVE report site. This issue is not unique to HPE servers.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where the RBSU "Storage Device Information" was empty when
    VROC is enabled.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address the issue where the TPM status displayed in RBSU and iLO web page was
    not in sync.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering System Information from
    RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Added "DMI Power Management (ASPM)" option in RBSU. The option has the default
    value of "disable", which will override default setting of "enable" from the
    previous ROM. This is due to enabling DMI power management might result in
    system hang with machine check exception based on Intel erratum RKL-15.
    
    The path to the option is: Processor Options -&gt; DMI Power Management (ASPM)
    
    This setting has the Redfish property URI of:
    /redfish/v1/systems/1/bios/settings/E3DmiAspm
    
    To follow DMTF schema, change the Redfish registry version naming to have the
    pattern of "^\d+.\d+.\d+$".
    
    For example,
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will
    now becomes
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.4 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2023-23583. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00_02-22-2024" date="1706270400">-     *Important Notes:**
    
    This version of the System ROM should be paired with Server Platform Services
    (SPS) Firmware 04.04.04.603 (2.00_12_18_2023).
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the PCI VPD data would be written unconditionally
    while system is accessing to PCI VPD.
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2024.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2021-38575, CVE-2022-36763,
    CVE-2022-36764, CVE-2023-45229 and CVE-2023-45853. This security vulnerability
    is documented in the CVE report site. This issue is not unique to HPE servers.
    
    Addressed an issue where the UBM version between RBSU and iLO web pages was
    not synchronized.
    
    Addressed an issue where NVME hot plug when installing fully loaded NVME
    drives.
    
    Addressed an issue vulnerabilities in network IP stack documented as from
    CVE-2023-45230 to CVE-2023-45237.
    
    Addressed an issue where the PCIE slot control would disappear in RBSU when
    the PCIE switchboard is installed in the system.
    
    Addressed an issue where the iSCSI SW ipv6 HDD can't be found under OS when
    iSCSI IP Address Type option is set to Auto in RBSU Network Options / iSCSI
    Configuration / Add an iSCSI Attempt &gt; select Network device &gt; IP Address
    Type.
    
    **Known Issues:**
    
    None</changelog>
  </package>
  <package pkgid="40e66d63a7edcce38f08594f9422402ae24fda0763193d5a52d5136b8b982f28" name="firmware-system-u60" arch="x86_64">
    <version epoch="0" ver="2.00_2024_02_01" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_04-18-2022" date="1652184000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21151, CVE-2022-0005,
    CVE-2021-33122, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33103. These
    security vulnerabilities are documented in the CVE report site. This issue is
    not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of freetype
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where system would not reboot if reboot test was executed
    after PCIe Bifurcation.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667822400">-     Added warning message Intel(R) NVMe is not supported when the Boot Mode is
    configured in Legacy BIOS Mode.
    
    This revision of the System ROM includes an updated revision of VROC UEFI
    driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21198 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where "Reboot Required" radio button isn't highlighted
    after BIOS restore.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837, CVE-2022-38090 and
    CVE-2022-30704. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where RBSU PCI device information page does not display the
    Intel VROC SATA firmware firmware version correctly.
    
    Addressed an issue where NVMe drive info cannot display properly in iLO web
    when PCH VMD is enabled.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the field "DIMM Map-Out Reason" of OEM SMBIOS type
    232 would update incorrectly per DIMM status.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages were
    not synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering "System Information"
    from RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Added "DMI Power Management (ASPM)" option in RBSU. The option has the default
    value of "disable", which will override default setting of "enable" from the
    previous ROM. This is due to enabling DMI power management might result in
    system hang with machine check exception based on Intel erratum RKL-15.
    
    The path to the option is: Processor Options -&gt; DMI Power Management (ASPM)
    
    This setting has the Redfish property URI of:
    /redfish/v1/systems/1/bios/settings/E3DmiAspm
    
    To follow DMTF schema, change the Redfish registry version naming to have the
    pattern of "^\d+.\d+.\d+$".
    
    For example,
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will
    now becomes
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.4 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2023-23583. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00_02-01-2024" date="1705320000">-     *Important Notes:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance. This revision of the System
    ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575,
    CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764. This revision of the System
    ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities
    documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237. This version of the System ROM should be paired with Server
    Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).
    
    **Firmware Dependencies:**
    
    **Problems Fixed:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance.
    
    This revision of the System ROM includes the mitigation for vulnerabilities
    documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and
    CVE-2022-36764.
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    Addressed an issue where the operating system cannot detect the iSCSI hard
    drive through IPv6 installation if the iSCSI IpAddressType is set to auto.
    
    Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI
    ASPM to Disabled/L1 Enabled.
    
    **Known Issues:**</changelog>
  </package>
  <package pkgid="da14719e8e89ae61e4d0263327a02680a55c1d7fa2a34a75f7a4d794ac81354c" name="firmware-system-u61" arch="x86_64">
    <version epoch="0" ver="2.00_2024_02_01" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.58_04-18-2022" date="1652184000">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21151, CVE-2022-0005,
    CVE-2021-33122, CVE-2021-33123, CVE-2021-33124, and CVE-2021-33103. These
    security vulnerabilities are documented in the CVE report site. This issue is
    not unique to HPE servers.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_07-14-2022" date="1660046400">-     *Important Notes:**
    
    When installing with HPE Smart Update Manager (SUM) 8.9.5 or earlier, the
    warning message "Component Not Signed" might be displayed for SHA-384 signed
    components. This issue will be resolved in a future version of SUM. For
    details, see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;d
    ocId=a00125612en_us.
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.2 microcode update which provides Intel's mitigation for BIOS advisory
    and security vulnerability documented as CVE-2022-21233. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of openSSL which
    provides mitigation for BIOS security vulnerabilities documented as
    CVE-2022-0778 (https://nvd.nist.gov/vuln/detail/CVE-2022-0778) and
    CVE-2022-2068 (https://nvd.nist.gov/vuln/detail/CVE-2022-2068). This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the latest revision of freetype
    library which provides mitigations for security vulnerability documented as
    CVE-2022-27405 (https://nvd.nist.gov/vuln/detail/CVE-2022-27405). This issue
    is not unique to HPE servers.
    
    This revision of the System ROM includes the latest revision of zlib library
    which provides mitigations for security vulnerability documented as
    CVE-2018-25032. This issue is not unique to HPE servers.
    
    Addressed an issue where the system fails to boot OpenShift Container Platform
    in UEFI boot and optimized boot modes.
    
    Addressed an issue where the system ROM does not display Storage controller
    product names when the RBSU language setting is non-English.
    
    Addressed an issue where system would not reboot if reboot test was executed
    after PCIe Bifurcation.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667822400">-     Added warning message Intel(R) NVMe is not supported when the Boot Mode is
    configured in Legacy BIOS Mode.
    
    This revision of the System ROM includes an updated revision of VROC UEFI
    driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21198 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837, CVE-2022-38090 and
    CVE-2022-30704. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where RBSU PCI device information page does not display the
    Intel VROC SATA firmware firmware version correctly.
    
    Addressed an issue where NVMe drive info cannot display properly in iLO web
    when PCH VMD is enabled.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_05-02-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the field DIMM Map-Out Reason of OEM SMBIOS type 232
    would update incorrectly per DIMM status.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages were
    not synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering System Information from
    RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Added "DMI Power Management (ASPM)" option in RBSU. The option has the default
    value of "disable", which will override default setting of "enable" from the
    previous ROM. This is due to enabling DMI power management might result in
    system hang with machine check exception based on Intel erratum RKL-15.
    
    The path to the option is: Processor Options -&gt; DMI Power Management (ASPM)
    
    This setting has the Redfish property URI of:
    /redfish/v1/systems/1/bios/settings/E3DmiAspm
    
    To follow DMTF schema, change the Redfish registry version naming to have the
    pattern of "^\d+.\d+.\d+$".
    
    For example,
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will
    now becomes
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.4 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2023-23583. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00_02-01-2024" date="1705320000">-     *Important Notes:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance. This revision of the System
    ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575,
    CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764. This revision of the System
    ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities
    documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237. This version of the System ROM should be paired with Server
    Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).
    
    **Firmware Dependencies:**
    
    **Problems Fixed:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance.
    
    This revision of the System ROM includes the mitigation for vulnerabilities
    documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and
    CVE-2022-36764.
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    Addressed an issue where the operating system cannot detect the iSCSI hard
    drive through IPv6 installation if the iSCSI IpAddressType is set to auto.
    
    Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI
    ASPM to Disabled/L1 Enabled.
    
    **Known Issues:**</changelog>
  </package>
  <package pkgid="5e330a25f3115c5cab97774abbd29bea8d80a7ad98e0cc6eae32c3da3c5db43f" name="firmware-system-u64" arch="x86_64">
    <version epoch="0" ver="2.00_2024_02_01" rel="1.1"/>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.60_06-30-2022" date="1663329600">-     *Important Notes:**
    
    None
    
    **Firmware Dependencies:**
    
    None
    
    **Enhancements/New Features:**
    
    This is the initial version of the firmware.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667822400">-     Added warning message Intel(R) NVMe is not supported when the Boot Mode is
    configured in Legacy BIOS Mode.
    
    This revision of the System ROM includes an updated revision of VROC UEFI
    driver.</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.64_10-20-2022" date="1667908800">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2022.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2022.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-21198 and CVE-2022-26837. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    Addressed an issue where Reboot Required radio button isn't highlighted after
    BIOS restore.
    
    Addressed an issue where an HPE MR controller's name is displayed abnormally
    after setting the language to Japanese in ROM Based Setup Utility (RBSU)
    rebooting the system.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.68_01-12-2023" date="1676376000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.1 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.1 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-26837, CVE-2022-38090 and
    CVE-2022-30704. This security vulnerability is documented in the CVE report
    site. This issue is not unique to HPE servers.
    
    This revision of the System ROM includes the revision of the zlib library
    1.2.13 update which provides mitigation for security vulnerabilities
    documented as CVE-2022-37434.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1s update which provides mitigation for security vulnerabilities
    documented as CVE-2022-2097.
    
    Addressed an issue where RBSU PCI device information page does not display the
    Intel VROC SATA firmware firmware version correctly.
    
    Addressed an issue where NVMe drive info cannot display properly in iLO web
    when PCH VMD is enabled.
    
    Addressed an issue when system discovers thousands of LUNs and was trying to
    create thousands of boot options for each LUNs. System cannot add, delete or
    adjust new boot options on iLO web and RBSU after rebooting. System becomes
    unstable unless loading manufacture default.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.72_04-20-2023" date="1683633600">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.2 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    Addressed an issue where the field DIMM Map-Out Reason of OEM SMBIOS type 232
    would update incorrectly per DIMM status.
    
    Addressed an issue where the TPM status between RBSU and iLO web pages were
    not synchronized.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.80_07-20-2023" date="1691496000">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.3 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.3 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2022-44611 and CVE-2022-40982. This
    security vulnerability is documented in the CVE report site. This issue is not
    unique to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1u update which provides mitigation for security vulnerabilities
    documented as CVE-2023-0286, CVE-2022-4304 and CVE-2023-2650.
    
    Address an issue where an abnormal power-on-password dialog would pop up even
    though user did not set a password.
    
    Address the issue where Secure Boot would not be enabled when loading
    manufacturing default from iLO web.
    
    Address an issue where RSOD would occur when entering System Information from
    RBSU under legacy mode.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699876800">-     Replaced "AC power" with "external power" in the help text of "Automatic
    power-on" option. This is due to ProLiant servers also provide the DC power
    supply option.
    
    Added "DMI Power Management (ASPM)" option in RBSU. The option has the default
    value of "disable", which will override default setting of "enable" from the
    previous ROM. This is due to enabling DMI power management might result in
    system hang with machine check exception based on Intel erratum RKL-15.
    
    The path to the option is: Processor Options -&gt; DMI Power Management (ASPM)
    
    This setting has the Redfish property URI of:
    /redfish/v1/systems/1/bios/settings/E3DmiAspm
    
    To follow DMTF schema, change the Redfish registry version naming to have the
    pattern of "^\d+.\d+.\d+$".
    
    For example,
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.v1_1_20 will
    now becomes
    /redfish/v1/registrystore/registries/zh/biosattributeregistrya55.1.1.20</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.90_10-19-2023" date="1699963200">-     *Important Notes:**
    
    This version of the System ROM contains updates aligned with the Intel Product
    Update (IPU) version IPU.2023.4 guidance.
    
    **Firmware Dependencies:**
    
    None
    
    **Problems Fixed:**
    
    This revision of the System ROM includes the latest revision of the Intel IPU
    2023.4 BIOS update which provides Intel's mitigation for BIOS advisory and
    security vulnerabilities documented as CVE-2023-23583. This security
    vulnerability is documented in the CVE report site. This issue is not unique
    to HPE servers.
    
    This revision of the System ROM includes the revision of the OpenSSL library
    1.1.1v update which provides mitigation for security vulnerabilities
    documented as CVE-2023-3817.
    
    Addressed an issue where system might hang while accessing IML logs from RBSU.
    
    **Known Issues:**
    
    None</changelog>
    <changelog author="HP Linux Development &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 2.00_02-01-2024" date="1705320000">-     *Important Notes:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance. This revision of the System
    ROM includes the mitigation for vulnerabilities documented as CVE-2021-38575,
    CVE-2023-45853, CVE-2022-36763 and CVE-2022-36764. This revision of the System
    ROM includes the mitigation for NetworkPkg PXE IP stack vulnerabilities
    documented as CVE-2023-45229, CVE-2023-45230, CVE-2023-45231, CVE-2023-45232,
    CVE-2023-45233, CVE-2023-45234, CVE-2023-45235, CVE-2023-45236, and
    CVE-2023-45237. This version of the System ROM should be paired with Server
    Platform Services (SPS) Firmware 06.00.03.604 (2.00_12_20_2023).
    
    **Firmware Dependencies:**
    
    **Problems Fixed:**
    
    This revision of the System ROM contains updates aligned with the Intel
    Product Update (IPU) version IPU.2024.1 guidance.
    
    This revision of the System ROM includes the mitigation for vulnerabilities
    documented as CVE-2021-38575, CVE-2023-45853, CVE-2022-36763 and
    CVE-2022-36764.
    
    This revision of the System ROM includes the mitigation for NetworkPkg PXE IP
    stack vulnerabilities documented as CVE-2023-45229, CVE-2023-45230,
    CVE-2023-45231, CVE-2023-45232, CVE-2023-45233, CVE-2023-45234,
    CVE-2023-45235, CVE-2023-45236, and CVE-2023-45237.
    
    Addressed an issue where the operating system cannot detect the iSCSI hard
    drive through IPv6 installation if the iSCSI IpAddressType is set to auto.
    
    Addressed an issue where DmiAspmCtrl was not set accordingly when setting DMI
    ASPM to Disabled/L1 Enabled.
    
    **Known Issues:**</changelog>
  </package>
  <package pkgid="ff921643e7fb6bea44c55f25ef771ca2a1d960ac3068f5371c5a99e233bcbb78" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.23.17_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.23.17-1.sles15sp4" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="8993f1f8fc63df895e78bd1121d5cfa4b2cddbe11b7dc95c5127cd0e21a1df6d" name="hp-i40e-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.23.17_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.23.17-1.sles15sp5" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="82105fa218d5e1e07d26816d1fd3926b5370bfe961f191d1277a12e2b3db48b3" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.9.1_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="2375b5d2176b72b70e62e91692ec316644634c28e5df2afe6a572b0b389dab1b" name="hp-iavf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.9.1_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="3061c69e6f9fddb1b9d59cf421ad6c1e201e1d360da74ec57f8a5ef60c932be1" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.14.16_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="0ef6b336ccf27d9cfa0c9bba8771fc323a82cb150768136a6b00d2600d62c9a5" name="hp-igb-kmp-default" arch="x86_64">
    <version epoch="0" ver="6.14.16_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="fa67b930076dc6d2e9820103e9ca7c59c8ab8f702b1c1851239f9b0f79efde7d" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.19.6_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="168b26995f212ad169ddaa7b684611412041f793d025c3bbdedc7cb660ec0452" name="hp-ixgbe-kmp-default" arch="x86_64">
    <version epoch="0" ver="5.19.6_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="0238da2940eddfb26a994fda82376f57ee241d77ba279f842c316ee1c5da4a41" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.18.7_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="6901dce14cdf89824087224bc2e33e80191e649b32998c1263b1c879315c5730" name="hp-ixgbevf-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.18.7_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="1f8792499ad2de1d71c9eb8a52ec7ef8a44aa47732b8b57ade58c202e1291ab8" name="hpe-emulex-smartsan-enablement-kit" arch="x86_64">
    <version epoch="0" ver="1.0.0.0" rel="4"/>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-1" date="1446465600">- Initial development</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-2" date="1469016000">- Added support the HPE StoreFabric 84E 4-port Fibre Channel Host Bus Adapter</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-3" date="1478174400">- Added support for HPE StoreFabric SN1200E 1P &amp; 2P, HPE StoreFabric SN1600E 1P &amp; 2P</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-4" date="1480334400">- Added support for HPE Synergy 3530C</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 1.0.0.0-4" date="1480507200">- Added Obsoletes tag since the rpm has been changed from noarch to x86_64 bit</changelog>
  </package>
  <package pkgid="ab244e46358e46c299772c59cf4e77532a76eb2fd5efac85c041e67899cb4135" name="hpe-qlogic-smartsan-enablement-kit" arch="x86_64">
    <version epoch="0" ver="3.3" rel="3"/>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-1" date="1448280000">- Initial development</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-2" date="1479384000">- Added support for SN1600Q 1P &amp; 2P devices</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-3" date="1480334400">- Added support for 84Q and 3830C devices</changelog>
    <changelog author="Cheryl DeLeo &lt;LinuxSWdeliverables@external.groups.hp.com&gt; 3.3-3" date="1480507200">- Added Obsoletes tag since the rpm has been changed from noarch to x86_64 bit</changelog>
  </package>
  <package pkgid="36d4866a34ddc28e2244aaa6020e64d54879d619cbe17d8f5a274af2bf8a70b7" name="hponcfg" arch="x86_64">
    <version epoch="0" ver="6.0.0" rel="0"/>
    <changelog author="Suhas MG &lt;suhas.mg@hpe.com&gt; 5.1.0-0" date="1502193600">- v5.1.0 is mainly targeted for iLO 5 1.15</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.2.0-0" date="1506340800">- v5.2.0 is mainly targeted for iLO 5 1.20</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.3.0-0" date="1521633600">- v5.3.0 is mainly targeted for iLO 5 1.30</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.4.0-0" date="1532606400">- Changes include to select correct libssl.so file when multiple Openssl installed (32-bit and 64-bit)</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.4.0-0" date="1555416000">- Changes to remove the low level openSSL calls.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.5.0-0" date="1559217600">-Updated the OpenSSL API calls to support Host's OpenSSL FIPS mode.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.6.0-0" date="1590494400">- Changes to handle multiple OpenSSL library installed.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.7.0-0" date="1638532800">- Changes to support RHEL 9.0 OS.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 5.8.0-0" date="1658923200">- Changes to add dependency check for RPM installation.</changelog>
    <changelog author="Naveen N &lt;naveen.n2@hpe.com&gt; 6.0.0-0" date="1659441600">- Changes to support iLO 6 or later.</changelog>
  </package>
  <package pkgid="4c0fcb8cac19a82fff14604b3239660e92349c2ba590694647368fec430fa125" name="ice-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.12.6_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="6aa8a17ea502091bbb18efbae8c8b0c9d1796fbba4716dba463072db6d9eac8a" name="ice-kmp-default" arch="x86_64">
    <version epoch="0" ver="1.12.6_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="f07194ef54da3b4de17f171dc73acbeb0f87a25745c4341fea462186554b89f4" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.26.1_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="Mohammad Sawalha &lt;mohammad@mellanox.com&gt;" date="1282737600">- Initial revision</changelog>
    <changelog author="Omer Dagan &lt;omerd@mellanox.com&gt;" date="1361188800">- Modified spec file to conform to KMP specifications</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1395230400">- Use one spec for KMP and non-KMP rpms.</changelog>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="91a9983e20f63ffcfea20d5e2942365c9c864ceb7277d487fc6397eea99a62dd" name="kernel-mft-mlnx-kmp-default" arch="x86_64">
    <version epoch="0" ver="4.26.1_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="Mohammad Sawalha &lt;mohammad@mellanox.com&gt;" date="1282737600">- Initial revision</changelog>
    <changelog author="Omer Dagan &lt;omerd@mellanox.com&gt;" date="1361188800">- Modified spec file to conform to KMP specifications</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1395230400">- Use one spec for KMP and non-KMP rpms.</changelog>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="8951912d0656e3a4a1fe9b917770134d12997a619a6060b7d07ae926c2a7bd2c" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="228.0.133.0.rhel8u7"/>
  </package>
  <package pkgid="9c2957f1e6ff0e6fdf704182bd52ee7fd93f6ae49d18535b85bae699a7c0486d" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="228.0.133.0.rhel8u8"/>
  </package>
  <package pkgid="a7b83b03587741b88b10d2b7c397cd0892cc68f4f0f56f3356d6c929b97e25a8" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="228.0.133.0.rhel9u1"/>
  </package>
  <package pkgid="d76a386f082442c673060264542303c778106c71c61dc40b5012be032a48d011" name="kmod-bnxt_en" arch="x86_64">
    <version epoch="0" ver="1.10.2" rel="228.0.133.0.rhel9u2"/>
  </package>
  <package pkgid="c61f19e9bc928db5608c567bc778e5e5be495a756088b42db05d1f46cc67114b" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.2.589.21" rel="1.rhel8u8"/>
    <changelog author="Broadcom Automated Build User&#13;" date="1634126400">- Added support for RHEL 8U5&#13;
- Removed support for RHEL 7U5&#13;
- Removed support for RHEL 7U6&#13;
- Removed support for RHEL 7U7&#13;
- Removed support for RHEL 7U8&#13;
- Removed support for RHEL 8U1&#13;
- Removed support for RHEL 8U2&#13;
- Removed support for RHEL 8U3&#13;
- Removed support for SLES 15 SP1&#13;
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1645012800">- Changed version to 14.2&#13;
- Added support for RHEL 8U6&#13;
- Added support for RHEL 9U0&#13;
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1684497600">- Added support for ALP SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1688731200">- Added support for RHEL 9U3&#13;
- Added support for RHEL 8U9</changelog>
  </package>
  <package pkgid="2dd4cf42e4061eefab84f3961e029585ef411c7bbc8cec94208c276ed0de9c57" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.2.589.21" rel="1.rhel8u9"/>
    <changelog author="Broadcom Automated Build User&#13;" date="1634126400">- Added support for RHEL 8U5&#13;
- Removed support for RHEL 7U5&#13;
- Removed support for RHEL 7U6&#13;
- Removed support for RHEL 7U7&#13;
- Removed support for RHEL 7U8&#13;
- Removed support for RHEL 8U1&#13;
- Removed support for RHEL 8U2&#13;
- Removed support for RHEL 8U3&#13;
- Removed support for SLES 15 SP1&#13;
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1645012800">- Changed version to 14.2&#13;
- Added support for RHEL 8U6&#13;
- Added support for RHEL 9U0&#13;
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1684497600">- Added support for ALP SP0</changelog>
    <changelog author="Broadcom Automated Build User&#13;" date="1688731200">- Added support for RHEL 9U3&#13;
- Added support for RHEL 8U9</changelog>
  </package>
  <package pkgid="6420a67f4485d1dedd622bc790e6bece24e2722b7a38a9c49f979deaade0ce43" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.2.589.21" rel="1.rhel9u2"/>
    <changelog author="Broadcom Automated Build User" date="1634126400">- Added support for RHEL 8U5
- Removed support for RHEL 7U5
- Removed support for RHEL 7U6
- Removed support for RHEL 7U7
- Removed support for RHEL 7U8
- Removed support for RHEL 8U1
- Removed support for RHEL 8U2
- Removed support for RHEL 8U3
- Removed support for SLES 15 SP1
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User" date="1645012800">- Changed version to 14.2
- Added support for RHEL 8U6
- Added support for RHEL 9U0
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1684497600">- Added support for ALP SP0</changelog>
    <changelog author="Broadcom Automated Build User" date="1688731200">- Added support for RHEL 9U3
- Added support for RHEL 8U9</changelog>
  </package>
  <package pkgid="370c9b08f0e9e36a1edf41ebd6adf41b3bedd6a9b53f35846e9ea8522fddf36a" name="kmod-elx-lpfc" arch="x86_64">
    <version epoch="0" ver="14.2.589.21" rel="1.rhel9u3"/>
    <changelog author="Broadcom Automated Build User" date="1634126400">- Added support for RHEL 8U5
- Removed support for RHEL 7U5
- Removed support for RHEL 7U6
- Removed support for RHEL 7U7
- Removed support for RHEL 7U8
- Removed support for RHEL 8U1
- Removed support for RHEL 8U2
- Removed support for RHEL 8U3
- Removed support for SLES 15 SP1
- Removed support for SLES 15 SP2</changelog>
    <changelog author="Broadcom Automated Build User" date="1645012800">- Changed version to 14.2
- Added support for RHEL 8U6
- Added support for RHEL 9U0
- Added support for SLES 15 SP4</changelog>
    <changelog author="Broadcom Automated Build User" date="1658232000">- Removed support for RHEL 8U4</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342400">- Added support for RHEL 9U1</changelog>
    <changelog author="Broadcom Automated Build User" date="1661342401">- Added support for RHEL 8U7</changelog>
    <changelog author="Broadcom Automated Build User" date="1667995200">- Added support for SLES 15 SP5</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585600">- Added support for RHEL 8U8</changelog>
    <changelog author="Broadcom Automated Build User" date="1677585601">- Added support for RHEL 9U2</changelog>
    <changelog author="Broadcom Automated Build User" date="1684497600">- Added support for ALP SP0</changelog>
    <changelog author="Broadcom Automated Build User" date="1688731200">- Added support for RHEL 9U3
- Added support for RHEL 8U9</changelog>
  </package>
  <package pkgid="cb524a41a8de863dcb0c905ae5fc1eb1e2c21e74a8563b7fbfc08e9431524cab" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.23.17" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.23.17-1.rhel8u6" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="590e2053da4ce30f6248e5d22f895eb859045c1cb108f83db07992754ee867da" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.23.17" rel="1.rhel8u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.23.17-1.rhel8u7" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="bb6bec1e03278667dd75682f2d87e52905404d160a33a5e1b9625d2dcbe77687" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.23.17" rel="1.rhel8u8"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.30-1" date="1533729600">- This driver fix unexpected error message appears in dmesg when driver is loaded.
- This driver fix VF 0 does not show via sysfs, and cannot be removed.
- This driver fix 1g speed i40e_aq_run_phy_activity() from f/w reports lpi statistics always as 0</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.23.17-1.rhel8u8" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="ff71d8b6ea385ebe199698176f8dea5f0753c84d23ca26389301db5ed4f1cae1" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.23.17" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.23.17-1.rhel9u0" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="adcf5353f8afaaa6fd1552b2dbca88374c8acaec480df1c274387dae0b431047" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.23.17" rel="1.rhel9u1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.23.17-1.rhel9u1" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="f019d4624ae69aa54bdfd4c53f5afe78318167149c0effbb2c0c49eba46f4914" name="kmod-hp-i40e" arch="x86_64">
    <version epoch="0" ver="2.23.17" rel="1.rhel9u2"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.23.17-1.rhel9u2" date="1560254400">- This driver fixes the issue of restoring all VF-d config on a VF reset.
- This driver fixes the issue of mirror rule via VF-d.
- This driver fixes the issue of VFD handler function prototypes.
- This driver fixes the issue of assuming hardware is at default when that's not always true. 
- This driver fixes the issue of not re-initializing properly in the case of CORE reset following PF reset timeout.
- This driver fixex the issue of unknown NMI received and kernel crash when adding/removing VF to namespace repeatedly.
- This driver fixes the issue of running 'ifconfig ethX mtu 2000' causes physial link down and failed to auto-recover, when we have set ' ethtool --set-priv-flags eth2 link-down-on-close on'.
- This driver now introduce allow_untagged VF-d attribute.
- This driver now add a helper function to validate a vf based on the vf id.
- This driver now add a macro for checking if prog_attached exists.
- This driver now add client register/unregister to prevent vsi.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.14-1" date="1565092800">- This driver added the "Negotiated" string into the i40e_print_link_message() function. 
- This driver fixes VF 0 failed opcode 3, when total cores =192( total threads =384, with Hyper threading enabled in BIOS)
- This driver remove RDMA VF code from files including VF support.
- This driver fixes the issue of reloading driver during resets loop causes platform to lose connection and trace call</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.16-1" date="1568721600">- This driver add support to expose VF stats as part of PF interface ethtool stats.
- This driver fix i40e Mirrors not clear after VF remove.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.10.19.81-1" date="1568721601">- This driver export LPI time duration statistic info which can be observed by ethtool -S $pf
- This driver fix an error message appeared like "0000 [#1] SMP PTI"</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; i40e-2.12.5_rc2-1" date="1591790400">- This driver fix the package traffic queue statistics.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc13-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc18-1" date="1597838400">- This driver fix the system might hang when reset.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.13.10_rc22-1" date="1600862400">- This driver fix kernel crash in iavf reset path.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 2.15.6" date="1614859200">- Removes rx_fragments and rx_jabber from rx_errors to avoid rx_jabber and rx_fragments incorrectly double count.
- Fixes ethtool warning message caused by incorrect data structure
- Add RHEL8.4 Support</changelog>
  </package>
  <package pkgid="5e84e1994d74bbd0a843b4b0cb7b8143ea5236735c738564bb8171e0114efe43" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.9.1" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="f8e6fed648beb6899075031db74b312ba24a9b069891f8c84d5e8579377a01eb" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.9.1" rel="1.rhel8u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="03cd2da7ba448b374ab17345c661fbfce1d8d98cfe864dd5fdbc1baaf10fe5e2" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.9.1" rel="1.rhel8u8"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="e2262554d48ead664bbaadb83d84879db750c2343054b38ca55fa71f3aec3a67" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.9.1" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="c298ad52cf2f09ef173c29c542ac581185d3869a01d6ec9717e3d77f602bd008" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.9.1" rel="1.rhel9u1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="816e04333bc69c4322fb8ed67dc5449a9b89ee175ca7110292e0ddc87e3c5659" name="kmod-hp-iavf" arch="x86_64">
    <version epoch="0" ver="4.9.1" rel="1.rhel9u2"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.7.61.20" date="1560254400">- Initial package which is renamed from i40evf driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 3.9.5" date="1589544000">- Creating CVL SW1.1 release candidate build.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.1-1" date="1597060800">- Add SLES15 SP2 support
- This driver fix system freezes when trying to create TCs on VF with no more VSIs available.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.0.2-1" date="1605268800">- Add RHEL8.3 support
- Add support to compile on Linux kernel &gt;= 5.9.0</changelog>
  </package>
  <package pkgid="c25a6347490a6c8232914a82bb30267869352e58446a79cae59c065e47b7efe9" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="5.14.16" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="86e67c0059a8faaf89b9cb2861004035133ca49f87bb881ae23330045ea8b564" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="5.14.16" rel="1.rhel9u1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="c1c246a20bec5e57e7d0b26e0b1857701b3bf9340b25ff8a74a8031b47e1e309" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="5.14.16" rel="1.rhel9u2"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="8622a37fa6f007c13fc36fff804462348da197e8ceeb48c68c32f6a12a82c130" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.14.16" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="d38da5dcb1e7494e372e35e3b865c05f1b30e9fd7ebdc66034cef037166d0c33" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.14.16" rel="1.rhel8u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="ba488ed451a49d7472ddedd5bec6ce83d3a1a8595664659bf0cfc0f0083a30ce" name="kmod-hp-igb" arch="x86_64">
    <version epoch="0" ver="6.14.16" rel="1.rhel8u8"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.3-1" date="1465214400">- Added RHEL 6.8 support
- Fix the issue of getting crash dump when loading igb module(modprobe igb)
- Fix unable to disable the offload property in rhel6u6</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.7-8[rhel6u9], 5.3.5.7-1[For other OSs]" date="1490097600">- Added SLES12SP2 support
- Added RHEL 7.3 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.9xxz-3" date="1501243200">- Added SLES12SP3 support
- Added RHEL 7.4 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.12" date="1505736000">- Fix for the issue of unable to set MTU value more than 1500 in SUSE12SP3 with Intel NICs</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-4" date="1526472000">- Fixed build on updated kernels of SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.15-7" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.19-0[rhel6.10, rhel7u5], 5.3.5.15-7[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.42" date="1561377600">- This driver fixes an issue of driver crash with ethtool command.
- This driver fixes an issue of Klocwork hits.
- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 6.2.5-1" date="1600862400">- Add RHEL8.3 support.</changelog>
  </package>
  <package pkgid="7d5483d6f754074db46d99bf6183a5fdb14c0fbce1bbd5be10e0b298b1f38939" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.19.6" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="86d130e36b985c67188050982e3a955d663aeef16d17e9857d2382f9b05f7a5d" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.19.6" rel="1.rhel8u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="531dc948df96c6e4f1d903f7278398d007294097a21586c8ee643edb0a73c808" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.19.6" rel="1.rhel8u8"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.5.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.3.7-0[rhel6.10, rhel7u5], 5.3.5.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.2-1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="e2ffb834be8d7fc7d9fc1e9a368f801f33c1da43ad3aa0b308df33e7b7294ce1" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.19.6" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="edb3c28ce71ee7234a5d4945c60a17c6d0010f5b3f5001f7c39d0f76fe00c019" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.19.6" rel="1.rhel9u1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="5ad6003f79b3f543353a5caf1ba4cccd5c3e70bd7c65669636f995c2e473cbb7" name="kmod-hp-ixgbe" arch="x86_64">
    <version epoch="0" ver="5.19.6" rel="1.rhel9u2"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.5.5-1" date="1552392000">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.7.1-1" date="1589544000">- IPv6 support for ixgbe driver</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.9.3-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 5.11.3-1" date="1614859200">- Fix potential memory leak</changelog>
  </package>
  <package pkgid="b50c999a7bf24f76512ca2642646de30c4528a1bff5f2714d82a126064c90ecf" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.18.7" rel="1.rhel8u6"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="27640663761a610cf49d5b5e4faa6eb46fd8e1b520d9b1a394c20ee1833e9a4d" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.18.7" rel="1.rhel8u7"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="d8da9616677b8abdd7ce55a99b61c00d4870d116a058df288850ecf3600a98de" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.18.7" rel="1.rhel8u8"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-5" date="1526472000">- This driver fixes the issue of failed to install driver on SLES12SP2</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.3.1-8" date="1532606400">- This driver fixes the Spectre/Meltdown issue.
- Added SLES15 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.3.5-0[rhel6.10, rhel7u5], 4.3.3.1-8[For other OSs]" date="1533729600">- Added RHEL6.10 Support.
- Added RHEL7.5 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="6018d19e219fc6454cf211d0f8b3f980e4d4617bf825d8dbd479570aaaba4b9b" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.18.7" rel="1.rhel9u0"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="3e4b87f6f7487f5b0fcf4af35a7a01d79785faa3050f6aa987b72c84f27ce6d5" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.18.7" rel="1.rhel9u1"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="7d753bdbba78027247629bcd42147f9f4ef86fe7cc66e044691fdf3325452f63" name="kmod-hp-ixgbevf" arch="x86_64">
    <version epoch="0" ver="4.18.7" rel="1.rhel9u2"/>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.1" date="1544443200">- Added RHEL7u6 Support.
- Added SLES12SP4 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.5.3-1" date="1554897600">- This driver fixes the issue when configuring MTU on VF in Guest OS would be failed.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.6.4-1" date="1569326400">- This driver fixes an issue of Infinite recursion in device shutdown path due to a corner case when PCIe link was down
- Fix the issue of typo in ethtool stats
- Added RHEL7u7 Support.
- Added RHEL8 Support.
- Added SLES15SP1 Support.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.0-1" date="1586174400">- This driver use macro to handle change in nd_tx_timeout.</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.7.1-1" date="1589544000">- Remove irqs only when they are set up
- Fix guest OS crashes during VFs resets</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.8.1-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HP Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hp.com&gt; 4.9.2-1" date="1599220800">- This driver add support for new mailbox communication between PF and VF</changelog>
  </package>
  <package pkgid="61db106b8e6584b121269f2b0ddaa01ceae1020cffd72dce44a7538e1e3a2daf" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.12.6" rel="1.rhel8u6"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="0418c2f8d13573b0cf2cac0101d7eec473764c36f73bd977fc1766c828cb8089" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.12.6" rel="1.rhel8u7"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="05406ad2330e9d5f47432bf7c1122286dea76b9e008afef8105ecc267955fb3a" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.12.6" rel="1.rhel8u8"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="c2fc88d18f915987df0d96d2c08b58b2c5d5e1a8205fa8f8d0b6c47de5695c9c" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.12.6" rel="1.rhel9u0"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="8dd40ab1ed50bb87e8a4fb8a8e2a6a8ff1b88269f25193b8fb5e98f4139800df" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.12.6" rel="1.rhel9u1"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="9a032df85f4e7847fdf0660d43dab3ef67dc0d4f6912214202289f4482d4b232" name="kmod-ice" arch="x86_64">
    <version epoch="0" ver="1.12.6" rel="1.rhel9u2"/>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.11.7-1" date="1568721600">- Initial package</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 0.13.1-1" date="1594728000">- Fix return values and prints in VF MAC add/del flow
- Fix kernel panic after transiting FW LLDP from on to off and restarting lldpad
- Fix Throughput lower than expected.</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.0.4-1" date="1597060800">- Add SLES15 SP2 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.1.4-1" date="1600862400">- Add RHEL8u3 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.2.0-1" date="1601985600">- Add RHEL7u9 support</changelog>
    <changelog author="HPE Linux SW Deliverables &lt;Linux_SWdeliverables@external.groups.hpe.com&gt; 1.6.4-1" date="1627041600">- Addressing the issue of system reboot on unloading iavf driver with maxvfs enabled in switchdev mode</changelog>
  </package>
  <package pkgid="9e25ad482bba98f2999b1b6fd6045224cfba4dea29553cbe4ed22d8f4c74d8df" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.26.1" rel="1.rhel8u8"/>
    <changelog author="Mohammad Sawalha &lt;mohammad@mellanox.com&gt;" date="1282737600">- Initial revision</changelog>
    <changelog author="Omer Dagan &lt;omerd@mellanox.com&gt;" date="1361188800">- Modified spec file to conform to KMP specifications</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1395230400">- Use one spec for KMP and non-KMP rpms.</changelog>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="1a1f7dae2ceb65097b3d0fc82b5a39c8818ad68736f96ad2c3d1b7c55b039e80" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.26.1" rel="1.rhel8u9"/>
    <changelog author="Mohammad Sawalha &lt;mohammad@mellanox.com&gt;" date="1282737600">- Initial revision</changelog>
    <changelog author="Omer Dagan &lt;omerd@mellanox.com&gt;" date="1361188800">- Modified spec file to conform to KMP specifications</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1395230400">- Use one spec for KMP and non-KMP rpms.</changelog>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="c81e8d5351cfd5e6dfb8fa4685d635b30695511ccf8caa140bc3074aed9a8fdc" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.26.1" rel="1.rhel9u2"/>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="161b01e56be164879d9cae852ef122275545730ee4f0188efa0f52cb6ea24d57" name="kmod-kernel-mft-mlnx" arch="x86_64">
    <version epoch="0" ver="4.26.1" rel="1.rhel9u3"/>
    <changelog author="Adrian Chiris &lt;adrianc@mellanox.com&gt;" date="1485864000">- Added PCI reset module for PPC</changelog>
  </package>
  <package pkgid="28046de0375b7a5b9c5001e8c413fb3d6a42e2b66af91a6e2c48b107219b138e" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.726.03.00_rhel8u7" rel="1"/>
  </package>
  <package pkgid="964bb38fbbd27ddb8867928662e2c5fd71ca26ca0e4a4ecc2fa6bf7e8c0a8a08" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.726.03.00_rhel8u8" rel="1"/>
  </package>
  <package pkgid="6e0ba5c3573ff2a8d8f63603bfaf0ad03c52c9608b8c281853992902755ff988" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.726.03.00_rhel9u1" rel="1"/>
  </package>
  <package pkgid="270956e825c056974ab98d3629cf4231d901ac09d735be45adcc9a158ab4565f" name="kmod-megaraid_sas" arch="x86_64">
    <version epoch="0" ver="07.726.03.00_rhel9u2" rel="1"/>
  </package>
  <package pkgid="e381263c5bdf0c5f1692d7c0124cf2de60c42eb8b11e97ed7a96dac761220333" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.10" rel="OFED.23.10.1.1.9.1.rhel8u8"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="0c157cc0077a6320f688f47eda55d043e93f215ceb125795d42be363132c35ce" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.10" rel="OFED.23.10.1.1.9.1.rhel8u9"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="7dd034537353094e026665c9648b5b5b67b571b74529418427d8d55b6095ec85" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.10" rel="OFED.23.10.1.1.9.1.rhel9u2"/>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="be93eb2f6c23ec9c843f4d0acf9a12bfc70673b77f27dd416b929b5883a9b568" name="kmod-mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.10" rel="OFED.23.10.1.1.9.1.rhel9u3"/>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="7b0c1079e729b50ca059b7d0c83e9848eb364b7de3c7975e769ab725eed69b0a" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.17" rel="1.rhel8u8"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="d630deea0974db422d94cf48ff4431b4a3b0dba75a74a1cc85ad394b8029ca68" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.17" rel="1.rhel9u2"/>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="fbe40981ff50fe216b1435879ff1a3a52920eec1d9619fdb70273696c3d0e227" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.17" rel="7.rhel8u9"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="a0e622cb95c2e74d6d618a04e4950d9b8287fad7102735b60857778fddd9c398" name="kmod-netxtreme2" arch="x86_64">
    <version epoch="0" ver="7.15.17" rel="7.rhel9u3"/>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="ee65cd1702ed17ec92fd56063da3dbd1a56744e39a82767ed46c27b61bad1351" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.74.0.1" rel="1.rhel8u8"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="6193c5f1d257b2be384cc3679b7d34161d61bbe97d745b2d84534a0fed8ea1af" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.74.0.1" rel="1.rhel8u9"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="1225726ddf22ac35c2a093aa41b6945801ef77552f4107cb5234fd4f16752198" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.74.0.1" rel="1.rhel9u2"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="69fca0586b03ea3779561976e9abc9d243ecc79352957e3953ef503a7b90ca01" name="kmod-qlgc-fastlinq" arch="x86_64">
    <version epoch="0" ver="8.74.0.1" rel="1.rhel9u3"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="052343c0e7be2fc7b9c678316cd1a98b9b93bf668dab45accb412ca6edb6dafe" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.11.00_k1" rel="1.rhel8u8"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.11.00-k1-1" date="1698235200">- 10.02.11.00-k1 NJ 10/25/2023
[FCD-xxx] : Remove PCI ID 0x2971
Resolution : Remove PCI ID 0x2971
Scope :

[FCD-3661] : Remove 8031 from deprecate and unmaintained list.
Resolution : Remove 8031 from deprecate and unmaintained list.
Scope : 8031

[FCD-3571] : Unable to resume FW dump collection
Resolution : send notification to udev
Scope : 27xx, 28xx

[FCD-3631] : Convert Port disable state to maintenance mode
Resolution : Rename state and turn flag indicator
Scope : 27xx + 28xx

- 10.02.11.00.a8-k1 NJ 10/13/2023
[FCD-3632] : Remove support for FCoE device ids.
Resolution : Remove FCoE ids from pci table.
Scope : 8xxx

[FCD-3624] : Fix optrom version displayed in FDMI
Resolution : Populate EFI version
Scope : Series Adapters

[FCD-3632] : Remove CNA reference from README.
Resolution : Remove CNA reference from README.
Scope : 8xxx

- 10.02.11.00.a7-k1 NJ 09/22/2023

[FCD-3195] : Fix flash read failure
Resolution : Check return code for each flash read.
Scope : Series Adapters

[FCD-3571] : System flood by fw dumps
Resolution : udev script to pause fw dump collection
Scope : Any

[FCD-3566] : Limit FW dump improvement to 27xx + 28xx
Resolution : Add filter for 27xx + 28xx adapters
Scope : 27xx+

[FCD-3497] : Return ENOBUFS if sg_cnt is more than one for ELS cmds.
Resolution : This error is because FW support single sg element for
ELS Pass-through IOCB (0x53h). This particular error
code will help API and Apps to display appropriate
message to the user.
Scope : All Adapters

[FCD-3510] : RHEL &amp; SLES OOB driver request: deprecate L8/Hilda HW
Resolution : Added a frame work to display the message based on device and OS.
Scope : L8 and L16 (Hilda and CNA)

[FCD-3269] : Init Control Block is dereferenced incorrectly
Resolution : Correctly dereference ICB
Scope : 20xx

[FCD-3421] : Add Support to collect fw_dump on system crash or panic.
Resolution : Add Support to collect fw_dump on system crash or panic
Scope : 27xx, 28xx

- 10.02.11.00.a6-k1 MR 09/08/2023

[FCD-XXX] : Modify error code handling for sfp fw upgrade mbx.
Resolution : Modify error code handling for sfp fw upgrade mbx.
Scope : 28xx

[FCD-XXX] : Block sysfs resets and fw_dump during sfp fw upgrade
Resolution : Block sysfs resets and fw_dump during sfp fw upgrade
Scope : 28xx

[FCP-743] : Block sysfs access during maintenance mode
Resolution : Add check for maintenance mode.
Scope : Any

[FCD-3506] : Fix double free of dsd_list during driver load.
Resolution : add pointer check before access
Scope : Any

- 10.02.11.00.a5-k1 MR 08/18/2023

[RH BZ 2039422] : NVMe-FC kernel crash during reload driver test
Resolution : validate nvme_local_port correctly
Scope : Any

[FCD-XXX] : Fix for potential Null pointer dereferenced
Resolution : Check before dereferencing pointer
Scope : Any

[FCP-743] : Enable driver attach to bad HW
Resolution : turn on ql2xstay_attach_on_load_failure option
Scope : 27xx, 28xx

- 10.02.11.00.a4-k1 MR 08/11/2023

[FCD-xxx] : Update README file for zio information
Resolution : Update readme file with zio information
Scope : Any

[FCD-3415] : Std-DIF is not working with HPe K1 driver
Resolution : Reset the protect bit in the INQ response
only when pDIF is enabled and negotiated.
Scope : 26xx/27xx/28xx

- 10.02.11.00.a3-k1 AG 08/03/2023

[FCP-743] : Allow only selective BSG requests in maintenance mode
Resolution : Allow certain BSG to go through during maintenance mode
Scope : Any

[FCP-743] : FW dump improvement
Resolution : Improve data capture
Scope : 27XX, 28XX

[FCD-3252] : Unable to act on RSCN for port online.
Resolution : Clear RSCN flag only when driver is acting on the notification
Scope : Any

[FCD-xxx] : 32 Bytes CDB
Resolution : Use Type 6 IOCB for CDB bigger than 16Bytes
Scope : Any

Unit Test : i) force IO to use Type6 only for over the weekend run.
ii) force error path(s) to make sure no crash.

[FCD-xxx] : Move resource to allow code reuse.
Resolution : relocate dsd_list to qpair
Scope : Any

- 10.02.11.00.a2-k1 AG 07/27/2023

[FCD-3411] : CS_DMA Error observed while running DIF IO
Resolution : While running DIF enabled IO, a CS_DMA error was observed.
A FW dump is needed to better debug this. So take a FW dump
on encountering this.
Scope : 27xx/288 series of adapters

[FCD-3406] : Modifiy default zio threshold value.
Resolution : Modifiy default zio threshold value.
Scope : 27xx/28xx Series Adapters

[FCD-3314] : Delay IO Abort on PCI error
Resolution : On detection of PCI error, allow IO's to wind down.
Scope : Any

[FCD-3314] : Fix system crash due to bad pointer access
Resolution : Check SRB type before access.
Scope : 27xx+

- 10.02.11.00.a1-k1 AG 07/14/2023

- FCP-749: qla2xxx: Add support for build for RH 9.3 and RH 8.9 distro
Resolution : Build on RH 9.3 was failing owing to change of definition
of fc_host_fpin_rcv and removal of DID_TARGET_FAILURE. Fix part of it
by updating to latest upstream code.
Scope : 27xx/28xx series of adapters


- FCD-3302 : During unload Error detected messages is seen.

Resolution : Change the wording of the message as its not an error.
Scope : Series Adapters

- FCD-3293 : Initiator sever getting crashed after LOGO.

Resolution : Fix double free of fcport
Scope : Any

- Revert "scsi: qla2xxx: Change default ZIO threshold."

This reverts commit 8812bcc1b7a25494ec8755ff3b61412a9993ff5b.
The ZIO threshold now is 64.

- FCD-xxx : Fix unreachable code

Resolution : Remove dead code
Scope : 28xx+

- FCD-3232 : Potential risk of double free pointer detected in Coverity scan by ran by Citrix

Resolution : NULL the pointer after first free.
Scope : All

- 10.02.10.00-k1 SK 06/14/2023
Non-alpha build

- 10.02.10.00.a2-k1 BH 05/12/2023

- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="360072b9b15b2192d5520c841e1e6a29d74bed930dedc64ab06866c0421badd5" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.11.00_k1" rel="1.rhel8u9"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.11.00-k1-1" date="1698235200">- 10.02.11.00-k1 NJ 10/25/2023
[FCD-xxx] : Remove PCI ID 0x2971
Resolution : Remove PCI ID 0x2971
Scope :

[FCD-3661] : Remove 8031 from deprecate and unmaintained list.
Resolution : Remove 8031 from deprecate and unmaintained list.
Scope : 8031

[FCD-3571] : Unable to resume FW dump collection
Resolution : send notification to udev
Scope : 27xx, 28xx

[FCD-3631] : Convert Port disable state to maintenance mode
Resolution : Rename state and turn flag indicator
Scope : 27xx + 28xx

- 10.02.11.00.a8-k1 NJ 10/13/2023
[FCD-3632] : Remove support for FCoE device ids.
Resolution : Remove FCoE ids from pci table.
Scope : 8xxx

[FCD-3624] : Fix optrom version displayed in FDMI
Resolution : Populate EFI version
Scope : Series Adapters

[FCD-3632] : Remove CNA reference from README.
Resolution : Remove CNA reference from README.
Scope : 8xxx

- 10.02.11.00.a7-k1 NJ 09/22/2023

[FCD-3195] : Fix flash read failure
Resolution : Check return code for each flash read.
Scope : Series Adapters

[FCD-3571] : System flood by fw dumps
Resolution : udev script to pause fw dump collection
Scope : Any

[FCD-3566] : Limit FW dump improvement to 27xx + 28xx
Resolution : Add filter for 27xx + 28xx adapters
Scope : 27xx+

[FCD-3497] : Return ENOBUFS if sg_cnt is more than one for ELS cmds.
Resolution : This error is because FW support single sg element for
ELS Pass-through IOCB (0x53h). This particular error
code will help API and Apps to display appropriate
message to the user.
Scope : All Adapters

[FCD-3510] : RHEL &amp; SLES OOB driver request: deprecate L8/Hilda HW
Resolution : Added a frame work to display the message based on device and OS.
Scope : L8 and L16 (Hilda and CNA)

[FCD-3269] : Init Control Block is dereferenced incorrectly
Resolution : Correctly dereference ICB
Scope : 20xx

[FCD-3421] : Add Support to collect fw_dump on system crash or panic.
Resolution : Add Support to collect fw_dump on system crash or panic
Scope : 27xx, 28xx

- 10.02.11.00.a6-k1 MR 09/08/2023

[FCD-XXX] : Modify error code handling for sfp fw upgrade mbx.
Resolution : Modify error code handling for sfp fw upgrade mbx.
Scope : 28xx

[FCD-XXX] : Block sysfs resets and fw_dump during sfp fw upgrade
Resolution : Block sysfs resets and fw_dump during sfp fw upgrade
Scope : 28xx

[FCP-743] : Block sysfs access during maintenance mode
Resolution : Add check for maintenance mode.
Scope : Any

[FCD-3506] : Fix double free of dsd_list during driver load.
Resolution : add pointer check before access
Scope : Any

- 10.02.11.00.a5-k1 MR 08/18/2023

[RH BZ 2039422] : NVMe-FC kernel crash during reload driver test
Resolution : validate nvme_local_port correctly
Scope : Any

[FCD-XXX] : Fix for potential Null pointer dereferenced
Resolution : Check before dereferencing pointer
Scope : Any

[FCP-743] : Enable driver attach to bad HW
Resolution : turn on ql2xstay_attach_on_load_failure option
Scope : 27xx, 28xx

- 10.02.11.00.a4-k1 MR 08/11/2023

[FCD-xxx] : Update README file for zio information
Resolution : Update readme file with zio information
Scope : Any

[FCD-3415] : Std-DIF is not working with HPe K1 driver
Resolution : Reset the protect bit in the INQ response
only when pDIF is enabled and negotiated.
Scope : 26xx/27xx/28xx

- 10.02.11.00.a3-k1 AG 08/03/2023

[FCP-743] : Allow only selective BSG requests in maintenance mode
Resolution : Allow certain BSG to go through during maintenance mode
Scope : Any

[FCP-743] : FW dump improvement
Resolution : Improve data capture
Scope : 27XX, 28XX

[FCD-3252] : Unable to act on RSCN for port online.
Resolution : Clear RSCN flag only when driver is acting on the notification
Scope : Any

[FCD-xxx] : 32 Bytes CDB
Resolution : Use Type 6 IOCB for CDB bigger than 16Bytes
Scope : Any

Unit Test : i) force IO to use Type6 only for over the weekend run.
ii) force error path(s) to make sure no crash.

[FCD-xxx] : Move resource to allow code reuse.
Resolution : relocate dsd_list to qpair
Scope : Any

- 10.02.11.00.a2-k1 AG 07/27/2023

[FCD-3411] : CS_DMA Error observed while running DIF IO
Resolution : While running DIF enabled IO, a CS_DMA error was observed.
A FW dump is needed to better debug this. So take a FW dump
on encountering this.
Scope : 27xx/288 series of adapters

[FCD-3406] : Modifiy default zio threshold value.
Resolution : Modifiy default zio threshold value.
Scope : 27xx/28xx Series Adapters

[FCD-3314] : Delay IO Abort on PCI error
Resolution : On detection of PCI error, allow IO's to wind down.
Scope : Any

[FCD-3314] : Fix system crash due to bad pointer access
Resolution : Check SRB type before access.
Scope : 27xx+

- 10.02.11.00.a1-k1 AG 07/14/2023

- FCP-749: qla2xxx: Add support for build for RH 9.3 and RH 8.9 distro
Resolution : Build on RH 9.3 was failing owing to change of definition
of fc_host_fpin_rcv and removal of DID_TARGET_FAILURE. Fix part of it
by updating to latest upstream code.
Scope : 27xx/28xx series of adapters


- FCD-3302 : During unload Error detected messages is seen.

Resolution : Change the wording of the message as its not an error.
Scope : Series Adapters

- FCD-3293 : Initiator sever getting crashed after LOGO.

Resolution : Fix double free of fcport
Scope : Any

- Revert "scsi: qla2xxx: Change default ZIO threshold."

This reverts commit 8812bcc1b7a25494ec8755ff3b61412a9993ff5b.
The ZIO threshold now is 64.

- FCD-xxx : Fix unreachable code

Resolution : Remove dead code
Scope : 28xx+

- FCD-3232 : Potential risk of double free pointer detected in Coverity scan by ran by Citrix

Resolution : NULL the pointer after first free.
Scope : All

- 10.02.10.00-k1 SK 06/14/2023
Non-alpha build

- 10.02.10.00.a2-k1 BH 05/12/2023

- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="2e25336ce7761e98eba177e2e26223d16b393c2d81c7248ab26d6afa2cb5764a" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.11.00_k1" rel="1.rhel9u2"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.11.00-k1-1" date="1698235200">- 10.02.11.00-k1 NJ 10/25/2023
[FCD-xxx] : Remove PCI ID 0x2971
Resolution : Remove PCI ID 0x2971
Scope :

[FCD-3661] : Remove 8031 from deprecate and unmaintained list.
Resolution : Remove 8031 from deprecate and unmaintained list.
Scope : 8031

[FCD-3571] : Unable to resume FW dump collection
Resolution : send notification to udev
Scope : 27xx, 28xx

[FCD-3631] : Convert Port disable state to maintenance mode
Resolution : Rename state and turn flag indicator
Scope : 27xx + 28xx

- 10.02.11.00.a8-k1 NJ 10/13/2023
[FCD-3632] : Remove support for FCoE device ids.
Resolution : Remove FCoE ids from pci table.
Scope : 8xxx

[FCD-3624] : Fix optrom version displayed in FDMI
Resolution : Populate EFI version
Scope : Series Adapters

[FCD-3632] : Remove CNA reference from README.
Resolution : Remove CNA reference from README.
Scope : 8xxx

- 10.02.11.00.a7-k1 NJ 09/22/2023

[FCD-3195] : Fix flash read failure
Resolution : Check return code for each flash read.
Scope : Series Adapters

[FCD-3571] : System flood by fw dumps
Resolution : udev script to pause fw dump collection
Scope : Any

[FCD-3566] : Limit FW dump improvement to 27xx + 28xx
Resolution : Add filter for 27xx + 28xx adapters
Scope : 27xx+

[FCD-3497] : Return ENOBUFS if sg_cnt is more than one for ELS cmds.
Resolution : This error is because FW support single sg element for
ELS Pass-through IOCB (0x53h). This particular error
code will help API and Apps to display appropriate
message to the user.
Scope : All Adapters

[FCD-3510] : RHEL &amp; SLES OOB driver request: deprecate L8/Hilda HW
Resolution : Added a frame work to display the message based on device and OS.
Scope : L8 and L16 (Hilda and CNA)

[FCD-3269] : Init Control Block is dereferenced incorrectly
Resolution : Correctly dereference ICB
Scope : 20xx

[FCD-3421] : Add Support to collect fw_dump on system crash or panic.
Resolution : Add Support to collect fw_dump on system crash or panic
Scope : 27xx, 28xx

- 10.02.11.00.a6-k1 MR 09/08/2023

[FCD-XXX] : Modify error code handling for sfp fw upgrade mbx.
Resolution : Modify error code handling for sfp fw upgrade mbx.
Scope : 28xx

[FCD-XXX] : Block sysfs resets and fw_dump during sfp fw upgrade
Resolution : Block sysfs resets and fw_dump during sfp fw upgrade
Scope : 28xx

[FCP-743] : Block sysfs access during maintenance mode
Resolution : Add check for maintenance mode.
Scope : Any

[FCD-3506] : Fix double free of dsd_list during driver load.
Resolution : add pointer check before access
Scope : Any

- 10.02.11.00.a5-k1 MR 08/18/2023

[RH BZ 2039422] : NVMe-FC kernel crash during reload driver test
Resolution : validate nvme_local_port correctly
Scope : Any

[FCD-XXX] : Fix for potential Null pointer dereferenced
Resolution : Check before dereferencing pointer
Scope : Any

[FCP-743] : Enable driver attach to bad HW
Resolution : turn on ql2xstay_attach_on_load_failure option
Scope : 27xx, 28xx

- 10.02.11.00.a4-k1 MR 08/11/2023

[FCD-xxx] : Update README file for zio information
Resolution : Update readme file with zio information
Scope : Any

[FCD-3415] : Std-DIF is not working with HPe K1 driver
Resolution : Reset the protect bit in the INQ response
only when pDIF is enabled and negotiated.
Scope : 26xx/27xx/28xx

- 10.02.11.00.a3-k1 AG 08/03/2023

[FCP-743] : Allow only selective BSG requests in maintenance mode
Resolution : Allow certain BSG to go through during maintenance mode
Scope : Any

[FCP-743] : FW dump improvement
Resolution : Improve data capture
Scope : 27XX, 28XX

[FCD-3252] : Unable to act on RSCN for port online.
Resolution : Clear RSCN flag only when driver is acting on the notification
Scope : Any

[FCD-xxx] : 32 Bytes CDB
Resolution : Use Type 6 IOCB for CDB bigger than 16Bytes
Scope : Any

Unit Test : i) force IO to use Type6 only for over the weekend run.
ii) force error path(s) to make sure no crash.

[FCD-xxx] : Move resource to allow code reuse.
Resolution : relocate dsd_list to qpair
Scope : Any

- 10.02.11.00.a2-k1 AG 07/27/2023

[FCD-3411] : CS_DMA Error observed while running DIF IO
Resolution : While running DIF enabled IO, a CS_DMA error was observed.
A FW dump is needed to better debug this. So take a FW dump
on encountering this.
Scope : 27xx/288 series of adapters

[FCD-3406] : Modifiy default zio threshold value.
Resolution : Modifiy default zio threshold value.
Scope : 27xx/28xx Series Adapters

[FCD-3314] : Delay IO Abort on PCI error
Resolution : On detection of PCI error, allow IO's to wind down.
Scope : Any

[FCD-3314] : Fix system crash due to bad pointer access
Resolution : Check SRB type before access.
Scope : 27xx+

- 10.02.11.00.a1-k1 AG 07/14/2023

- FCP-749: qla2xxx: Add support for build for RH 9.3 and RH 8.9 distro
Resolution : Build on RH 9.3 was failing owing to change of definition
of fc_host_fpin_rcv and removal of DID_TARGET_FAILURE. Fix part of it
by updating to latest upstream code.
Scope : 27xx/28xx series of adapters


- FCD-3302 : During unload Error detected messages is seen.

Resolution : Change the wording of the message as its not an error.
Scope : Series Adapters

- FCD-3293 : Initiator sever getting crashed after LOGO.

Resolution : Fix double free of fcport
Scope : Any

- Revert "scsi: qla2xxx: Change default ZIO threshold."

This reverts commit 8812bcc1b7a25494ec8755ff3b61412a9993ff5b.
The ZIO threshold now is 64.

- FCD-xxx : Fix unreachable code

Resolution : Remove dead code
Scope : 28xx+

- FCD-3232 : Potential risk of double free pointer detected in Coverity scan by ran by Citrix

Resolution : NULL the pointer after first free.
Scope : All

- 10.02.10.00-k1 SK 06/14/2023
Non-alpha build

- 10.02.10.00.a2-k1 BH 05/12/2023

- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="5a453570fde29fc3c95c76e04354cff9c80e381946f254cbcee5c58db98cb3fb" name="kmod-qlgc-qla2xxx" arch="x86_64">
    <version epoch="0" ver="10.02.11.00_k1" rel="1.rhel9u3"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.11.00-k1-1" date="1698235200">- 10.02.11.00-k1 NJ 10/25/2023
[FCD-xxx] : Remove PCI ID 0x2971
Resolution : Remove PCI ID 0x2971
Scope :

[FCD-3661] : Remove 8031 from deprecate and unmaintained list.
Resolution : Remove 8031 from deprecate and unmaintained list.
Scope : 8031

[FCD-3571] : Unable to resume FW dump collection
Resolution : send notification to udev
Scope : 27xx, 28xx

[FCD-3631] : Convert Port disable state to maintenance mode
Resolution : Rename state and turn flag indicator
Scope : 27xx + 28xx

- 10.02.11.00.a8-k1 NJ 10/13/2023
[FCD-3632] : Remove support for FCoE device ids.
Resolution : Remove FCoE ids from pci table.
Scope : 8xxx

[FCD-3624] : Fix optrom version displayed in FDMI
Resolution : Populate EFI version
Scope : Series Adapters

[FCD-3632] : Remove CNA reference from README.
Resolution : Remove CNA reference from README.
Scope : 8xxx

- 10.02.11.00.a7-k1 NJ 09/22/2023

[FCD-3195] : Fix flash read failure
Resolution : Check return code for each flash read.
Scope : Series Adapters

[FCD-3571] : System flood by fw dumps
Resolution : udev script to pause fw dump collection
Scope : Any

[FCD-3566] : Limit FW dump improvement to 27xx + 28xx
Resolution : Add filter for 27xx + 28xx adapters
Scope : 27xx+

[FCD-3497] : Return ENOBUFS if sg_cnt is more than one for ELS cmds.
Resolution : This error is because FW support single sg element for
ELS Pass-through IOCB (0x53h). This particular error
code will help API and Apps to display appropriate
message to the user.
Scope : All Adapters

[FCD-3510] : RHEL &amp; SLES OOB driver request: deprecate L8/Hilda HW
Resolution : Added a frame work to display the message based on device and OS.
Scope : L8 and L16 (Hilda and CNA)

[FCD-3269] : Init Control Block is dereferenced incorrectly
Resolution : Correctly dereference ICB
Scope : 20xx

[FCD-3421] : Add Support to collect fw_dump on system crash or panic.
Resolution : Add Support to collect fw_dump on system crash or panic
Scope : 27xx, 28xx

- 10.02.11.00.a6-k1 MR 09/08/2023

[FCD-XXX] : Modify error code handling for sfp fw upgrade mbx.
Resolution : Modify error code handling for sfp fw upgrade mbx.
Scope : 28xx

[FCD-XXX] : Block sysfs resets and fw_dump during sfp fw upgrade
Resolution : Block sysfs resets and fw_dump during sfp fw upgrade
Scope : 28xx

[FCP-743] : Block sysfs access during maintenance mode
Resolution : Add check for maintenance mode.
Scope : Any

[FCD-3506] : Fix double free of dsd_list during driver load.
Resolution : add pointer check before access
Scope : Any

- 10.02.11.00.a5-k1 MR 08/18/2023

[RH BZ 2039422] : NVMe-FC kernel crash during reload driver test
Resolution : validate nvme_local_port correctly
Scope : Any

[FCD-XXX] : Fix for potential Null pointer dereferenced
Resolution : Check before dereferencing pointer
Scope : Any

[FCP-743] : Enable driver attach to bad HW
Resolution : turn on ql2xstay_attach_on_load_failure option
Scope : 27xx, 28xx

- 10.02.11.00.a4-k1 MR 08/11/2023

[FCD-xxx] : Update README file for zio information
Resolution : Update readme file with zio information
Scope : Any

[FCD-3415] : Std-DIF is not working with HPe K1 driver
Resolution : Reset the protect bit in the INQ response
only when pDIF is enabled and negotiated.
Scope : 26xx/27xx/28xx

- 10.02.11.00.a3-k1 AG 08/03/2023

[FCP-743] : Allow only selective BSG requests in maintenance mode
Resolution : Allow certain BSG to go through during maintenance mode
Scope : Any

[FCP-743] : FW dump improvement
Resolution : Improve data capture
Scope : 27XX, 28XX

[FCD-3252] : Unable to act on RSCN for port online.
Resolution : Clear RSCN flag only when driver is acting on the notification
Scope : Any

[FCD-xxx] : 32 Bytes CDB
Resolution : Use Type 6 IOCB for CDB bigger than 16Bytes
Scope : Any

Unit Test : i) force IO to use Type6 only for over the weekend run.
ii) force error path(s) to make sure no crash.

[FCD-xxx] : Move resource to allow code reuse.
Resolution : relocate dsd_list to qpair
Scope : Any

- 10.02.11.00.a2-k1 AG 07/27/2023

[FCD-3411] : CS_DMA Error observed while running DIF IO
Resolution : While running DIF enabled IO, a CS_DMA error was observed.
A FW dump is needed to better debug this. So take a FW dump
on encountering this.
Scope : 27xx/288 series of adapters

[FCD-3406] : Modifiy default zio threshold value.
Resolution : Modifiy default zio threshold value.
Scope : 27xx/28xx Series Adapters

[FCD-3314] : Delay IO Abort on PCI error
Resolution : On detection of PCI error, allow IO's to wind down.
Scope : Any

[FCD-3314] : Fix system crash due to bad pointer access
Resolution : Check SRB type before access.
Scope : 27xx+

- 10.02.11.00.a1-k1 AG 07/14/2023

- FCP-749: qla2xxx: Add support for build for RH 9.3 and RH 8.9 distro
Resolution : Build on RH 9.3 was failing owing to change of definition
of fc_host_fpin_rcv and removal of DID_TARGET_FAILURE. Fix part of it
by updating to latest upstream code.
Scope : 27xx/28xx series of adapters


- FCD-3302 : During unload Error detected messages is seen.

Resolution : Change the wording of the message as its not an error.
Scope : Series Adapters

- FCD-3293 : Initiator sever getting crashed after LOGO.

Resolution : Fix double free of fcport
Scope : Any

- Revert "scsi: qla2xxx: Change default ZIO threshold."

This reverts commit 8812bcc1b7a25494ec8755ff3b61412a9993ff5b.
The ZIO threshold now is 64.

- FCD-xxx : Fix unreachable code

Resolution : Remove dead code
Scope : 28xx+

- FCD-3232 : Potential risk of double free pointer detected in Coverity scan by ran by Citrix

Resolution : NULL the pointer after first free.
Scope : All

- 10.02.10.00-k1 SK 06/14/2023
Non-alpha build

- 10.02.10.00.a2-k1 BH 05/12/2023

- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="19e0dbe7dd8d80f66238563f59fca87017aff3f966fa553cd504f5bb760b70f8" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.26" rel="030.rhel8u7"/>
  </package>
  <package pkgid="b230073de450a514fd5f4fa68128e923c44c8ad32e354deb6e4529214ae9fb19" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.26" rel="030.rhel8u8"/>
  </package>
  <package pkgid="457b6e4aa89659b4aedb46106fb0610a740459022df2d1c682b245ad2a8a8ccc" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.26" rel="030.rhel9u1"/>
  </package>
  <package pkgid="1bd7c0d2e073a75a01c25a98f8926577fb9e9d7602cc470196111c6060a9f852" name="kmod-smartpqi" arch="x86_64">
    <version epoch="0" ver="2.1.26" rel="030.rhel9u2"/>
  </package>
  <package pkgid="c69726950e0f3165f2be5056f01f81dd9cc9341ae4a4e520cebe8b4d3e3226c4" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139k" rel="1.rhel8u7"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="564ebcd0696f06161a4987857dff8b1dd78f743fb839b1e2e1f3231e9f0dfca3" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139k" rel="1.rhel8u8"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="12d545758a1e720b4a46b4a7951d2570525d3d6fd5bd9a04ce8bcd65bd39902b" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139k" rel="1.rhel9u1"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="2ebbf0663b0395b2db8a2106326e546215ea1edef1073f59e139d784994e820c" name="kmod-tg3" arch="x86_64">
    <version epoch="0" ver="3.139k" rel="1.rhel9u2"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497441600">- Add workaround for 5762 MRRS  (Severity:Medium)
- Update copyright year to 2017 (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="0fde706787a646baf22967a15224544a58a171927d3fbb71ee369ef1489877df" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="228.0.133.0" rel="rhel8u7"/>
  </package>
  <package pkgid="398c8f618f17338a62f74df73fa5d70d8c3a9fd2cab81b12bcbfecc285c5341e" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="228.0.133.0" rel="rhel8u8"/>
  </package>
  <package pkgid="9ed771b973272b70e2624f3d6a0e19d397d14448b1af31adc0ac3618a3511849" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="228.0.133.0" rel="rhel9u1"/>
  </package>
  <package pkgid="5fb1b4f209166a709b82f78f604001506bedc05b17e3212ed89ca4111592b8f4" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="228.0.133.0" rel="rhel9u2"/>
  </package>
  <package pkgid="0e9790f23fa8f971bddc694b241161580611ed5daf692aa891ad3faebee8a3fd" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="228.0.133.0" rel="sles15sp4"/>
  </package>
  <package pkgid="e7cc62a3932a5d37a630970a73dafa8af08f21754d8dac1a4c397251669cd0e8" name="libbnxt_re" arch="x86_64">
    <version epoch="0" ver="228.0.133.0" rel="sles15sp5"/>
  </package>
  <package pkgid="f811ced747baa39a381e28a365771af462bf4a1357908ef8c70a7169a6e90374" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.726.03.00_sles15sp4" rel="1"/>
  </package>
  <package pkgid="2060eba7b1745fbb836ab7b86271a610018803bb4ea8b9c9bc9c8ff0526c92d0" name="lsi-megaraid_sas-kmp-default" arch="x86_64">
    <version epoch="0" ver="07.726.03.00_sles15sp5" rel="1"/>
  </package>
  <package pkgid="8599542e4549d43046f9a241898664fa6fb22b93620eb36cf2516ab971ef50fc" name="mft" arch="x86_64">
    <version epoch="0" ver="4.26.1" rel="3.rhel8u8"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 4.26.1-3.rhel8u8</changelog>
  </package>
  <package pkgid="886ca47126469ded8de7ae0d92d0a19408ecebfa1a6a72220c05d4560a8794ba" name="mft" arch="x86_64">
    <version epoch="0" ver="4.26.1" rel="3.rhel8u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 4.26.1-3.rhel8u9</changelog>
  </package>
  <package pkgid="ca71884dae7da70289f772c1a1e1ccea40d127291bf49a2144d7797875cb8cf9" name="mft" arch="x86_64">
    <version epoch="0" ver="4.26.1" rel="3.rhel9u2"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 4.26.1-3.rhel9u2</changelog>
  </package>
  <package pkgid="b9ebda6ba9cc208be6a6516848b216034a17d6cb4488640c9ba891c835434edc" name="mft" arch="x86_64">
    <version epoch="0" ver="4.26.1" rel="3.rhel9u3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 4.26.1-3.rhel9u3</changelog>
  </package>
  <package pkgid="20f3f0cb6f11900bd9a00585ecaf563a8832a2f30fd8e1261d63beee99be3af7" name="mft" arch="x86_64">
    <version epoch="0" ver="4.26.1" rel="3.sles15sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 4.26.1-3.sles15sp4</changelog>
  </package>
  <package pkgid="2a4aae3708acb0c0f389f5bf2fc4402748ae671e8c2badb66d92ad8d427f64e0" name="mft" arch="x86_64">
    <version epoch="0" ver="4.26.1" rel="3.sles15sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 4.26.1-3.sles15sp5</changelog>
  </package>
  <package pkgid="979034a5cd46e428357c6211ed871b5d5b75c805613545677e3dad8599023dde" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.10" rel="OFED.23.10.1.1.9.1.rhel8u8"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 23.10-OFED.23.10.1.1.9.1.rhel8u8</changelog>
  </package>
  <package pkgid="d6d7543d2c87b8449c1dd77d8e7086ef653dc546479a9d082aca5f4f4cb8ce0a" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.10" rel="OFED.23.10.1.1.9.1.rhel8u9"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 23.10-OFED.23.10.1.1.9.1.rhel8u9</changelog>
  </package>
  <package pkgid="cb9f93bb872357fa504137ef5b69b4eb7a087d40f7abf5eca24ed853737494d9" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.10" rel="OFED.23.10.1.1.9.1.rhel9u2"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 23.10-OFED.23.10.1.1.9.1.rhel9u2</changelog>
  </package>
  <package pkgid="84f352da2066324abfdfd2e81622e56271b307b4bcf1b8e7fb8ed9c19c7d21fd" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.10" rel="OFED.23.10.1.1.9.1.rhel9u3"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 23.10-OFED.23.10.1.1.9.1.rhel9u3</changelog>
  </package>
  <package pkgid="37bfff5edc6b83bbe0f273d69b146a8116addb17f3f9097dfb7b73f6e2c3991d" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.10" rel="OFED.23.10.1.1.9.1.sles15sp4"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 23.10-OFED.23.10.1.1.9.1.sles15sp4</changelog>
  </package>
  <package pkgid="85439905a48dc467bdef1314dc4d865fd3d1f2b10c1a60ea11a1ac9bbb88946d" name="mlnx-ofa_kernel" arch="x86_64">
    <version epoch="0" ver="23.10" rel="OFED.23.10.1.1.9.1.sles15sp5"/>
    <changelog author="Mellanox Technologies &lt;support@mellanox.com&gt;" date="1701864000">- Release version 23.10-OFED.23.10.1.1.9.1.sles15sp5</changelog>
  </package>
  <package pkgid="dc0d3d392c8103038419ea42952bf92a413bfa467bed379d687fd0b92aa1b0f1" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="23.10_k5.14.21_150400.22" rel="OFED.23.10.1.1.9.1.sles15sp4"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="7321473e99745f78143fe0ac89fe791b0637781b4cf38a0b2869b69e8fe5cfed" name="mlnx-ofa_kernel-kmp-default" arch="x86_64">
    <version epoch="0" ver="23.10_k5.14.21_150500.53" rel="OFED.23.10.1.1.9.1.sles15sp5"/>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1220875200">- Added nfsrdma support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1265284800">- Added ibdev2netdev script</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1273492800">- Support install macro that removes RPM_BUILD_ROOT</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1286193600">- Add mlx4_fc and mlx4_vnic support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.co.il&gt;" date="1309953600">- Add KMP support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1331035200">- Add weak updates support</changelog>
    <changelog author="Vladimir Sokolovsky &lt;vlad@mellanox.com&gt;" date="1335268800">- Remove FC support</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1394712000">- Use one spec for KMP and non-KMP OS's.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1397131200">- Add QoS utils.</changelog>
    <changelog author="Alaa Hleihel &lt;alaa@mellanox.com&gt;" date="1434628800">- Renamed kernel-ib package to mlnx-ofa_kernel-modules</changelog>
  </package>
  <package pkgid="f283cce25533b23e3d5d26825e6d913c087955a70f25b6f12536fec4add4a74c" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.15.17_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="d74b3c7e99c71321d86822ffaed17881e513ae31c5f2c70f9696497628cf9734" name="netxtreme2-kmp-default" arch="x86_64">
    <version epoch="0" ver="7.15.17_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="Broadcom Build Environment" date="1371816000">-Added Linux SRIOV support
-Added iSCSI &amp; FCoE HBA support for specific HP adapters and devices
-Added VC4.10 support
-Added BCV support
-When GRO setting changes while LRO is enabled, don't reload as LRO takes precedence.
-Allow UDP tunneling offload
-Enable IPGRE RSS by default
-Support different GRE RSS modes.</changelog>
    <changelog author="Broadcom Build Environment" date="1386936000">-Add RH5.10 support.
-Add RH6.5 support.
-FC-TAPE - Host responds early to a requested resend delay - Linux (70101)
-SLES11 MEZ75 IO halt with Nexus reboot tests (70728)
-SLES 11 blade loses all targets from BLOM port during fabric uplink add/remove (70187)
-KVM gso and gro are not working on hv and vm as expected (70506)
-SRIOV mtu toggle failure (70530)
-SRIOV hv reboots on pf toggle with vfs passed through on it. (70531)
-Guest OS dosent boot after attaching VF in RHEL6.3x64bit for 57840 device. (68426)
-[NET]SUT reboot&amp;MCE report when create 30th/31st VF on 57810 device on SLES11 SP2. (69263)
-RH Cert - RH5 | U8 | v7-1.5-33 | 57810 | Flex Network Test failed. (70427)
-BACS 16.2.0: Show ETS/Priority Tagging/PFC as operational when DCBX is disabled on the switch side. (69690)
-Incorrect port value is displayed for connected/unconnected ports of 57810 for RHEL5.9 64bits. (68627)
-VFs are not getting created for Broadcom adapters in RHEL5.10 OS. (71456)</changelog>
    <changelog author="QLogic Build Environment 7.12.37.1" date="1437739200">- added RH5.11 support.
- added RH6.6 &amp; RH6.7 support.
- added RH7.0 &amp; RH7.1 support.
- added SLES11-SP4 &amp; SLES12 support.
- added VLAN filtering offload support.
- added Debian GNU/Linux 7 (wheezy) support.
- In RHEL7.0 and 7.1, bnx2x will be rolled back to inbox after system reboot (80071).
- SRIOV : MAC address change inside VM is not allowed unless interface is down (80309).
- RH7.x:  Tunneling offload is not enabled (79269).
- self test fails on 20G adapter (79295).
- VF interface vlan-filtering stopped working (79365).
- Fail to force link speed other than 20G in KR2 (77841).
- Incorrect asymmetric flow-control behavior (75504).
- Dynamic VF enumeration fails for 578xx adapter in SLES11 SP4 (78590).
- Inner-to-outer vlan priority mapping doesn't work (RH6.x [pre 2.6.38 kernels]).
- Packets from a VF with pvid configured which were sent with a different vlan were transmitted instead of being discarded.
- UDP packets cannot pass to the upper application (5709).
- Out of memory issue when the adapter is reset (5709).
- iSCSI offload: Driver displaying incorrect remote port (77842).
- FCoE offload: Initiators failed FLOGI on SLES 11 SP4 RC1 (79704).</changelog>
  </package>
  <package pkgid="9a0eac8aab0828783bf858083d53d3937ba6d9cb1ee50a26de7a9d0b370d7934" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.74.0.1_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="e38e2afe1b7b0221c0ee49f968d6b836249984cc94827a608003785c634ec0b5" name="qlgc-fastlinq-kmp-default" arch="x86_64">
    <version epoch="0" ver="8.74.0.1_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="QLogic Cavium Build environment" date="1490270400">- Version 8.18.18.0
- Added missing support to configure 1G speed via ethtool
- Fixed calculation of number of ooo rx buffers and limit to 16K

- Version 8.18.17.0-1
- iWARP - Handle flush completion on unaligned ll2 connection
- Add dp_module, dp_level as modparams
- Add Kconfig file for upstream builds

- Version 8.18.16.0-1
- Fix missing return error code check on call to qedi_setup_int
- Modify different module params
- Add log message in the driver unload path
- Fail all non-timesync related ioctls

- Version 8.18.15.0-1
- Added wwpn and wwnn to the FCoE dev-info
- Validate chap and mutual chap auth correctly

- Version 8.18.14.0-1
- Fix error handling flow in TX path
- Fix error handling flow in RX path
- Implement get_protocol_tlv_data callback</changelog>
  </package>
  <package pkgid="7fa4fb02ca2ad8c1319dc1096ef72d3c518c977bf423452c3959ceb571593204" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.02.11.00_k1_k5.14.21_150400.22" rel="1.sles15sp4"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.11.00-k1-1" date="1698235200">- 10.02.11.00-k1 NJ 10/25/2023
[FCD-xxx] : Remove PCI ID 0x2971
Resolution : Remove PCI ID 0x2971
Scope :

[FCD-3661] : Remove 8031 from deprecate and unmaintained list.
Resolution : Remove 8031 from deprecate and unmaintained list.
Scope : 8031

[FCD-3571] : Unable to resume FW dump collection
Resolution : send notification to udev
Scope : 27xx, 28xx

[FCD-3631] : Convert Port disable state to maintenance mode
Resolution : Rename state and turn flag indicator
Scope : 27xx + 28xx

- 10.02.11.00.a8-k1 NJ 10/13/2023
[FCD-3632] : Remove support for FCoE device ids.
Resolution : Remove FCoE ids from pci table.
Scope : 8xxx

[FCD-3624] : Fix optrom version displayed in FDMI
Resolution : Populate EFI version
Scope : Series Adapters

[FCD-3632] : Remove CNA reference from README.
Resolution : Remove CNA reference from README.
Scope : 8xxx

- 10.02.11.00.a7-k1 NJ 09/22/2023

[FCD-3195] : Fix flash read failure
Resolution : Check return code for each flash read.
Scope : Series Adapters

[FCD-3571] : System flood by fw dumps
Resolution : udev script to pause fw dump collection
Scope : Any

[FCD-3566] : Limit FW dump improvement to 27xx + 28xx
Resolution : Add filter for 27xx + 28xx adapters
Scope : 27xx+

[FCD-3497] : Return ENOBUFS if sg_cnt is more than one for ELS cmds.
Resolution : This error is because FW support single sg element for
ELS Pass-through IOCB (0x53h). This particular error
code will help API and Apps to display appropriate
message to the user.
Scope : All Adapters

[FCD-3510] : RHEL &amp; SLES OOB driver request: deprecate L8/Hilda HW
Resolution : Added a frame work to display the message based on device and OS.
Scope : L8 and L16 (Hilda and CNA)

[FCD-3269] : Init Control Block is dereferenced incorrectly
Resolution : Correctly dereference ICB
Scope : 20xx

[FCD-3421] : Add Support to collect fw_dump on system crash or panic.
Resolution : Add Support to collect fw_dump on system crash or panic
Scope : 27xx, 28xx

- 10.02.11.00.a6-k1 MR 09/08/2023

[FCD-XXX] : Modify error code handling for sfp fw upgrade mbx.
Resolution : Modify error code handling for sfp fw upgrade mbx.
Scope : 28xx

[FCD-XXX] : Block sysfs resets and fw_dump during sfp fw upgrade
Resolution : Block sysfs resets and fw_dump during sfp fw upgrade
Scope : 28xx

[FCP-743] : Block sysfs access during maintenance mode
Resolution : Add check for maintenance mode.
Scope : Any

[FCD-3506] : Fix double free of dsd_list during driver load.
Resolution : add pointer check before access
Scope : Any

- 10.02.11.00.a5-k1 MR 08/18/2023

[RH BZ 2039422] : NVMe-FC kernel crash during reload driver test
Resolution : validate nvme_local_port correctly
Scope : Any

[FCD-XXX] : Fix for potential Null pointer dereferenced
Resolution : Check before dereferencing pointer
Scope : Any

[FCP-743] : Enable driver attach to bad HW
Resolution : turn on ql2xstay_attach_on_load_failure option
Scope : 27xx, 28xx

- 10.02.11.00.a4-k1 MR 08/11/2023

[FCD-xxx] : Update README file for zio information
Resolution : Update readme file with zio information
Scope : Any

[FCD-3415] : Std-DIF is not working with HPe K1 driver
Resolution : Reset the protect bit in the INQ response
only when pDIF is enabled and negotiated.
Scope : 26xx/27xx/28xx

- 10.02.11.00.a3-k1 AG 08/03/2023

[FCP-743] : Allow only selective BSG requests in maintenance mode
Resolution : Allow certain BSG to go through during maintenance mode
Scope : Any

[FCP-743] : FW dump improvement
Resolution : Improve data capture
Scope : 27XX, 28XX

[FCD-3252] : Unable to act on RSCN for port online.
Resolution : Clear RSCN flag only when driver is acting on the notification
Scope : Any

[FCD-xxx] : 32 Bytes CDB
Resolution : Use Type 6 IOCB for CDB bigger than 16Bytes
Scope : Any

Unit Test : i) force IO to use Type6 only for over the weekend run.
ii) force error path(s) to make sure no crash.

[FCD-xxx] : Move resource to allow code reuse.
Resolution : relocate dsd_list to qpair
Scope : Any

- 10.02.11.00.a2-k1 AG 07/27/2023

[FCD-3411] : CS_DMA Error observed while running DIF IO
Resolution : While running DIF enabled IO, a CS_DMA error was observed.
A FW dump is needed to better debug this. So take a FW dump
on encountering this.
Scope : 27xx/288 series of adapters

[FCD-3406] : Modifiy default zio threshold value.
Resolution : Modifiy default zio threshold value.
Scope : 27xx/28xx Series Adapters

[FCD-3314] : Delay IO Abort on PCI error
Resolution : On detection of PCI error, allow IO's to wind down.
Scope : Any

[FCD-3314] : Fix system crash due to bad pointer access
Resolution : Check SRB type before access.
Scope : 27xx+

- 10.02.11.00.a1-k1 AG 07/14/2023

- FCP-749: qla2xxx: Add support for build for RH 9.3 and RH 8.9 distro
Resolution : Build on RH 9.3 was failing owing to change of definition
of fc_host_fpin_rcv and removal of DID_TARGET_FAILURE. Fix part of it
by updating to latest upstream code.
Scope : 27xx/28xx series of adapters


- FCD-3302 : During unload Error detected messages is seen.

Resolution : Change the wording of the message as its not an error.
Scope : Series Adapters

- FCD-3293 : Initiator sever getting crashed after LOGO.

Resolution : Fix double free of fcport
Scope : Any

- Revert "scsi: qla2xxx: Change default ZIO threshold."

This reverts commit 8812bcc1b7a25494ec8755ff3b61412a9993ff5b.
The ZIO threshold now is 64.

- FCD-xxx : Fix unreachable code

Resolution : Remove dead code
Scope : 28xx+

- FCD-3232 : Potential risk of double free pointer detected in Coverity scan by ran by Citrix

Resolution : NULL the pointer after first free.
Scope : All

- 10.02.10.00-k1 SK 06/14/2023
Non-alpha build

- 10.02.10.00.a2-k1 BH 05/12/2023

- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="224741f97eca1f70458295e15b621386c67965e8e723d4662f3e4239a1fc1ff7" name="qlgc-qla2xxx-kmp-default" arch="x86_64">
    <version epoch="0" ver="10.02.11.00_k1_k5.14.21_150500.53" rel="1.sles15sp5"/>
    <changelog author="QLogic Corp &lt;support@qlogic.com&gt; 10.02.11.00-k1-1" date="1698235200">- 10.02.11.00-k1 NJ 10/25/2023
[FCD-xxx] : Remove PCI ID 0x2971
Resolution : Remove PCI ID 0x2971
Scope :

[FCD-3661] : Remove 8031 from deprecate and unmaintained list.
Resolution : Remove 8031 from deprecate and unmaintained list.
Scope : 8031

[FCD-3571] : Unable to resume FW dump collection
Resolution : send notification to udev
Scope : 27xx, 28xx

[FCD-3631] : Convert Port disable state to maintenance mode
Resolution : Rename state and turn flag indicator
Scope : 27xx + 28xx

- 10.02.11.00.a8-k1 NJ 10/13/2023
[FCD-3632] : Remove support for FCoE device ids.
Resolution : Remove FCoE ids from pci table.
Scope : 8xxx

[FCD-3624] : Fix optrom version displayed in FDMI
Resolution : Populate EFI version
Scope : Series Adapters

[FCD-3632] : Remove CNA reference from README.
Resolution : Remove CNA reference from README.
Scope : 8xxx

- 10.02.11.00.a7-k1 NJ 09/22/2023

[FCD-3195] : Fix flash read failure
Resolution : Check return code for each flash read.
Scope : Series Adapters

[FCD-3571] : System flood by fw dumps
Resolution : udev script to pause fw dump collection
Scope : Any

[FCD-3566] : Limit FW dump improvement to 27xx + 28xx
Resolution : Add filter for 27xx + 28xx adapters
Scope : 27xx+

[FCD-3497] : Return ENOBUFS if sg_cnt is more than one for ELS cmds.
Resolution : This error is because FW support single sg element for
ELS Pass-through IOCB (0x53h). This particular error
code will help API and Apps to display appropriate
message to the user.
Scope : All Adapters

[FCD-3510] : RHEL &amp; SLES OOB driver request: deprecate L8/Hilda HW
Resolution : Added a frame work to display the message based on device and OS.
Scope : L8 and L16 (Hilda and CNA)

[FCD-3269] : Init Control Block is dereferenced incorrectly
Resolution : Correctly dereference ICB
Scope : 20xx

[FCD-3421] : Add Support to collect fw_dump on system crash or panic.
Resolution : Add Support to collect fw_dump on system crash or panic
Scope : 27xx, 28xx

- 10.02.11.00.a6-k1 MR 09/08/2023

[FCD-XXX] : Modify error code handling for sfp fw upgrade mbx.
Resolution : Modify error code handling for sfp fw upgrade mbx.
Scope : 28xx

[FCD-XXX] : Block sysfs resets and fw_dump during sfp fw upgrade
Resolution : Block sysfs resets and fw_dump during sfp fw upgrade
Scope : 28xx

[FCP-743] : Block sysfs access during maintenance mode
Resolution : Add check for maintenance mode.
Scope : Any

[FCD-3506] : Fix double free of dsd_list during driver load.
Resolution : add pointer check before access
Scope : Any

- 10.02.11.00.a5-k1 MR 08/18/2023

[RH BZ 2039422] : NVMe-FC kernel crash during reload driver test
Resolution : validate nvme_local_port correctly
Scope : Any

[FCD-XXX] : Fix for potential Null pointer dereferenced
Resolution : Check before dereferencing pointer
Scope : Any

[FCP-743] : Enable driver attach to bad HW
Resolution : turn on ql2xstay_attach_on_load_failure option
Scope : 27xx, 28xx

- 10.02.11.00.a4-k1 MR 08/11/2023

[FCD-xxx] : Update README file for zio information
Resolution : Update readme file with zio information
Scope : Any

[FCD-3415] : Std-DIF is not working with HPe K1 driver
Resolution : Reset the protect bit in the INQ response
only when pDIF is enabled and negotiated.
Scope : 26xx/27xx/28xx

- 10.02.11.00.a3-k1 AG 08/03/2023

[FCP-743] : Allow only selective BSG requests in maintenance mode
Resolution : Allow certain BSG to go through during maintenance mode
Scope : Any

[FCP-743] : FW dump improvement
Resolution : Improve data capture
Scope : 27XX, 28XX

[FCD-3252] : Unable to act on RSCN for port online.
Resolution : Clear RSCN flag only when driver is acting on the notification
Scope : Any

[FCD-xxx] : 32 Bytes CDB
Resolution : Use Type 6 IOCB for CDB bigger than 16Bytes
Scope : Any

Unit Test : i) force IO to use Type6 only for over the weekend run.
ii) force error path(s) to make sure no crash.

[FCD-xxx] : Move resource to allow code reuse.
Resolution : relocate dsd_list to qpair
Scope : Any

- 10.02.11.00.a2-k1 AG 07/27/2023

[FCD-3411] : CS_DMA Error observed while running DIF IO
Resolution : While running DIF enabled IO, a CS_DMA error was observed.
A FW dump is needed to better debug this. So take a FW dump
on encountering this.
Scope : 27xx/288 series of adapters

[FCD-3406] : Modifiy default zio threshold value.
Resolution : Modifiy default zio threshold value.
Scope : 27xx/28xx Series Adapters

[FCD-3314] : Delay IO Abort on PCI error
Resolution : On detection of PCI error, allow IO's to wind down.
Scope : Any

[FCD-3314] : Fix system crash due to bad pointer access
Resolution : Check SRB type before access.
Scope : 27xx+

- 10.02.11.00.a1-k1 AG 07/14/2023

- FCP-749: qla2xxx: Add support for build for RH 9.3 and RH 8.9 distro
Resolution : Build on RH 9.3 was failing owing to change of definition
of fc_host_fpin_rcv and removal of DID_TARGET_FAILURE. Fix part of it
by updating to latest upstream code.
Scope : 27xx/28xx series of adapters


- FCD-3302 : During unload Error detected messages is seen.

Resolution : Change the wording of the message as its not an error.
Scope : Series Adapters

- FCD-3293 : Initiator sever getting crashed after LOGO.

Resolution : Fix double free of fcport
Scope : Any

- Revert "scsi: qla2xxx: Change default ZIO threshold."

This reverts commit 8812bcc1b7a25494ec8755ff3b61412a9993ff5b.
The ZIO threshold now is 64.

- FCD-xxx : Fix unreachable code

Resolution : Remove dead code
Scope : 28xx+

- FCD-3232 : Potential risk of double free pointer detected in Coverity scan by ran by Citrix

Resolution : NULL the pointer after first free.
Scope : All

- 10.02.10.00-k1 SK 06/14/2023
Non-alpha build

- 10.02.10.00.a2-k1 BH 05/12/2023

- FCD-3140: qla2xxx: Fix command flush on cable pull.
Changes: Add wait for commands to return.

- FCD-XXX: qla2xxx: NVME|FCP prefer flag not being honored.
Changes: Reread prefer flag on chip reset

- FCD-XXX: qla2xxx: Update readme file

- 10.02.10.00.a1-k1 BH 05/02/2023
- FCD-XXX: qla2xxx: Update Copyright
Changes: Update Copyright for Marvell.

- FCD-XXX: qla2xxx: Update manufacturer detail
Changes: Update manufacturer detail to "Marvell"

- FCD-3140: qla2xxx: Host crash during StressAndHostPortReset test
Changes: Remove unused nvme_ls_waitq wait queue.

- FCD-XXX: qla2xxx: [RH-BZ 2167274]: Wait for io return on terminate rport.
Changes: dd wait to terminate_rport_io

- 10.02.09.00.a11-k1 BH 03/27/2023
- FCD-XXX: qla2xxx: Add link down + logo rx stat counts
Changes: Add counters to track link down and Logo receive.

- 10.02.09.00.a10-k1 BH 03/17/2023
- FCD-XXX: qla2xxx: Support for update SFP firmware of ACCELINK
Changes: [New Feature] Support for update SFP FW of ACCELINK WTD 64G

- FCD-717: qla2xxx: Split FCE|EFT trace control
Changes: Split buffer alloc and enable of feature into individual step.

- BZ-2093878: qla2xxx: perform lockless command completion in abort path
Changes: Perform lockless command completion in abort path

- 10.02.09.00.a9-k1 BH 03/06/2023
- FCD-2390: qla2xxx: Fix N2N stuck connection.
Changes: Clear the blocking flag.

- FCD-2496: qla2xxx: Prevent command send on chip reset
Changes: Check for chip reset before sending IOCB.

- FCD-2035: qla2xxx: Fix mem access after free.
Changes: Remove access of memory

- FCD-2720: qla2xxx: Move cmd_to_req_q latency counter before processing response.
- FCD-XXX: qla2xxx: Update readme file for current program

- 10.02.09.00.a8-k1 BH 02/27/2023
- FCD-2585: qla2xxx: Remove unsupported ql2xenabledif option.
Changes: Removed unsupported ql2xenabledif=1 option and validate the user input.

- FCD-2305: qla2xxx: Error code did not return to upper layer
Changes: Preserve error code from TMF and return it to upper layer.

- FCD-2035: qla2xxx: fix inconsistent TMF timeout.
Changes: Allow TMF error to return to upper layer without session tear down.

- FCD-2035: qla2xxx: Fix TMF leak through.
Changes: Check for chip reset or session change before sending Task management.

- 10.02.09.00.a7-k1 BH 02/17/2023
- FCD-2858: qla2xxx: USCM: Check for vp_idx before setting EDC and RDF set flags.
Changes: Add check for vp_idx before setting EDC and RDF set flags when processing RIDA.

Revert patch:
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition.

- 10.02.09.00.a6-k1 BH 02/13/2023
- FCD-2750: qla2xxx: IO's are failing on Standard DIF enabled 3PAR LUN
Changes: Revert an offending patch and work on an issue with upstream.

- 10.02.09.00.a5-k1 BH 02/06/2023
- FCD-2858: qla2xxx: USCM: Remove EDC and RDF set flags on Report ID Acquisition
Changes: Remove EDC and RDF set flags on Report ID Acquisition.

- FCD-2879: qla2xxx: Compilation errors on SLES15SP5 Beta3-202301
Changes: Write generic code to find tag of scsi cmnd

- FCD-2846: qla2xxx: Correct bsg_reply size in bsg interface
Changes: Fix the bsg_job-&gt;reply_len with size of "struct fc_bsg_reply"

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the invariant expression in the condition

- FCD-XXXX: qla2xxx: KW: unreachable code
Changes: Remove the expression flogi_acc_pld_remaining == 0

- FCD-XXXX: qla2xxx: Changes of logs level for SFP temperature monitoring

- 10.02.09.00.a4-k1 BH 01/29/2023
- FCD-2308: qla2xxx: Add bsg call to read port information
Changes: Add bsg interface to allow app to read remote port information.

- FCD-XXX: qla2xxx: KW-97439: unreachable code
Changes: Return void if return value is not needed

- FCD-XXX: qla2xxx: Add logs for SFP temperature monitoring
Changes: Add debug log for Temperature Alert (8070h) Asynchronous Event

- 10.02.09.00.a3-k1 BH 01/19/2023
- FCD-XXX: qla2xxx: Add support of RHEL9.2
- FCD-XXX: qla2xxx: Add support of RHEL8.8
- FCD-XXX: qla2xxx: Add support of SLES15 SP5
- FCD-2800: qla2xxx: Add support of OpenEuler-22.03

- 10.02.09.00.a2-k1 BH 01/10/2023
- FCD-XXX: qla2xxx: kw: unreachable code, SRB type is 0 just before latency counter incremented.
Changes: SRB type is 0 just before latency counter incremented.

- FCD-XXX: qla2xxx: kw: reset current_topology much later
Changes: Reset current_topology much later on detecting

- FCD-XXX: qla2xxx: kw: unreachable code, CS_COMPLETE is 0 and its already checked.
Changes: Remove unreachable

- FCD-XXX: qla2xxx: kw: Checking for port_state always yields zero
Changes: Instead of bitwise AND check for port_state directly

- FCD-1569: qla2xxx: Fix fw resource tracking
Changes: Use global counter

- FCD-XXX: qla2xxx: [ER-144639]: Flush mailbox commands on chip reset
Changes: Use lock to prevent race condition.

- FCD-2735: qla2xxx: USCM-VL: NVRAM VL disabled logins with extend FLOGI (VL enabled)
Changes: Reset the spl. features control block flag to avoid logging in with ER_RDY.

- FCD-XXX: qla2xxx: klockwork: Fix buffer over flow
Changes: Use correct buffer size.

- FCD-XXX: qla2xxx: EDIF: kw: remove unnecessary bit field
- FCD-2563: qla2xxx: Turn off noisy message log.
- FCD-XXX: qla2xxx: kw: remove dead code in qla24xx_config_rings

- 10.02.09.00.a1-k1 BH 01/10/2023
- FCD-717: qla2xxx: allow FW dump extraction if load fail
Changes: Add knob to force driver to stay attached to the fail adapter.

- FCD-717: qla2xxx: Initialize FW buffer size with seed value
Changes: Initialize FW Buffer size with seed value

- FCD-XXX: qla2xxx: klockwork: Remove QLA_COMMAND_ERROR check in qla2x00_execute_fw.
Changes: Remove the unnecessary QLA_COMMAND_ERROR check

- FCD-2390: qla2xxx: Fix session hang in gnl
Changes: Clear this flag to prevent blockage.

- FCD-2390: qla2xxx: Fix erroneous link up failure
Changes: Set fw_started flag early to prevent interrupts being dropped

- FCD-2496: qla2xxx: Fix command flush during TMF
Changes: Wait for commands flush before closing TMF

- FCD-2035: qla2xxx: Limit TMF to 8 per function
Changes: Limit TMF to 8 per function

- FCD-XXX: qla2xxx: Add NVMe Disconnect support.
Changes: Add support for NVMe Disconnect feature.

- FCD-XXX: qla2xxx: Modify qla27xx_copy_fpin_pkt to support PURLS IOCB.
Changes: Modified qla27xx_copy_fpin_pkt to support both PUREX and PURLS IOCBs.

- FCD-717: qla2xxx: Adjust iocb resource on qpair create
Changes: Add call to readjust iocb + exchange limit.

- FCD-2390: qla2xxx: Fix deletion race condition
Changes: Move check field behind lock

- FCD-XXX: qla2xxx: klockwork: Pointer checked for NULL at linx x will be dereferenced at linx x+y.
Changes: Remove the unnecessary Null check. The pointer will likely be valid.

- FCD-XXX: qla2xxx: Observed call trace in smp_processor_id() with debug kernel
Changes: Use raw_smp_processor_id API

- FCD-2275: qla2xxx: USCM: Cleanup code related to IOPS based throttling
Changes: IOPS and BW based throttling is not used. Remove those code.

- FCD-2273: qla2xxx: USCM: Code cleanup w.r.t module params (ql2x_scmr_flow_ctl_tgt, ql2x_scmr_flow_ctl_host)
Changes: Remove the redundant module parameters

- FCD-2408: qla2xxx: USCM: Driver doesn't honor the adapter port Restore Default Settings
Changes: Update the nvram values to the host as well as fcport

- FCD-2363: qla2xxx: USCM: Slow Queue usage changes
Changes: Use Slow queue only under specific scenarios

- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Don't increment the counter for under-run.

- FCD-2291: qla2xxx: Erroneous link down.
Changes: Allow adapter reset to complete before discovery

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Bail out of TMF on error

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced

- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path

- FCD-XXX: qla2xxx: USCM: Debug log message improvement
Changes: Log target WWPN for peer congestion

- FCD-2164: qla2xxx: Fix stall session after app start
Changes: Use session delete to avoid the accidental clearing of scan_flag

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Check fcport state before invoking the mailbox

- FCD-XXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: Set throughput baseline on 1st FPIN

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix parsing the fpin when multiple descriptors are present

- FCD-XXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCD-XXX: qla2xxx: USCM: Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: Fix for KW-97392
Changes :Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: Remove dead code - flagged by klocwork
- FCD-847: qla2xxx: fixup: Fix exchange over subscription.
- FCD-2434: qla2xxx: Fix crash when IO abort times out
- FCD-XXX: qla2xxx: Rearrange scm rx path handling code.

- 10.02.08.01-k1 BH 09/28/2022
- FCD-2392: Fix initrd image creation failure in OpenEuler, Kylin and UOS
Changes: Add support for creating initrd image on openEuler, Kylin and UOS

- 10.02.08.00-k1 BH 09/16/2022
- FCD-XXX: qla2xxx: Don't increment interface err cnt in SS_RESIDUAL_UNDER case.
Changes: Residual under-run is not an interface error, hence no need to increment that count.

- FCD-2291: qla2xxx: Fix erroneous link down.
Changes: Allow adapter reset to complete before any scan can start.

- FCD-2035: qla2xxx: Fix hang in task management
Changes: Add additional error check at various point

- FCD-XXX: qla2xxx: Reduce memory usage during low IO.
Changes: Free the extra buffers as traffic is reduced.

- 10.02.08.00.a7-k1 BH 08/22/2022
- FCD-2212: qla2xxx: USCM: Observed call trace during the rmmod qla2xxx module
Changes: Free srb when throttle down I/O in NVME path.

- FCD-2164: qla2xxx: USCM: Fix stall session after app start
Changes: Prevent accidental clearing of flag that blocks re-login

- FCD-2185: qla2xxx: USCM: Peer congestion throttling functionality doesn't honor the ISP reset/port toggle
Changes: Clear the fcport throttling state on an ISP reset.

- FCD-2194: qla2xxx: USCM: VL - Mailbox cmd failure during port toggle
Changes: Heck fcport state before invoking mailbox

- FCDXXX: qla2xxx: USCM: Debug log message improvement

- 10.02.08.00.a6-k1 BH 08/09/2022
- FCDXXX: qla2xxx: USCM: VL - Enhance BW throttle to account for perf. drop while using VL
Changes: if VL switchreduces the throughput below 50%, we would not throttle any further.

- FCD-2096: qla2xxx: USCM: VL - PUN not incremented on PCN FPIN
Changes: Fix the FPIN parsing to take into account multiple descriptors.

- FCDXXX: qla2xxx: USCM: VL, Cache priority values from FLOGI_ACC
Changes: Use priority values cached from FLOGI_ACC, when there is no PUN

- FCDXXX: qla2xxx: USCM:Limit throttling down based on throughput
Changes: Limit throttling down based on throughput

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..10

- 10.02.08.00.a5-k1 BH 07/29/2022
- FCD-XXX: qla2xxx: klocwork: Possible Null Pointer Dereference
Changes: Validate rport before dereferencing

- FCD-XXX: qla2xxx: klocwork: Array 'port_dstate_str' of size 10 may use index value(s) 10..15
Changes: Correct the index of array

- FCD-XXX: qla2xxx: USCM: Fix mqueuecommand return code during throttle down request.

- FCD-XXX: qla2xxx: Revert klockwork: Fix buffer overrun

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
- FCD-2035: qla2xxx: Fix Task Mgmt Cmd fail due to unavailable resource
Changes: Limit TM commands to 8 per target.

- 10.02.08.00.a4-k1 BH 07/23/2022
- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: check for exchange availability before command submission

- FCD-XXX: qla2xxx: Remove unintended flag clearing
Changes: Remove unintended flag clearing.

- FCD-2035: qla2xxx: Fix task mgmt cmd fail with status 30h
Changes: Add wait for completion of Marker!

- FCD-XXX: Fix performance dip due to lock contention
Changes: Save the allocated memory for reuse and avoid the lock

- FCDXXX: qla2xxx: USCM: Do not send EDC and RDF for NPIV ports
Changes: Disable sending USCM ELS for vports

- FCDXXX: qla2xxx: USCM: VL: Do not set target speed to 1G for slow lane
Changes: Do not set the target speed while changing lanes.

- FCD-2012: qla2xxx: Throttling up messages seen when profile is changed
Changes: Set the new profile for each fcport (along with the host).

- FCD-XXX: qla2xxx: USCM: VL - Clean up FLOGI_ACC parsing
Changes: structure that could be used to parse the FLOGI_ACC by using offsets

- FCD-1990: qla2xxx: Fix nvram load config error
Changes: Remove re-definition of port flags while enabling virtual lane support

- FCD-XXX: qla2xxx: USCM:VL, I/O does not move back to the normal lane
Changes: Check if I/O throttling is being done, before deciding to move the normal lane.

- FCD-XXX: qla2xxx: Fix stall login
Changes: Reset session state to allow relogin logic to re-drive the connection.

- FCD-847: qla2xxx: Fix exchange over subscription for mgt cmd.
Changes: would check for exchange availability before command submission.

- FCD-847: qla2xxx: Fix exchange over subscription.
Changes: would check for exchange availability before command submission.

- FCD-XXX: qla2xxx: relocate/rename vp map.
- FCD-XXX: qla2xxx: Klocwork: Fix for Unexpected type of a scan function parameter

- 10.02.08.00.a3-k1 BH 07/01/2022
- FCD-1818: qla2xxx: Fix call trace in debug kernel due to missing spinlock init
Changes: Fix the call trace by initializing trace lock.

- FCD-1923: qla2xxx: USCM: VL - After disabling VL via CLI, status shows "Non-operational"
Changes: Return VL status appropropriately

- FCD-1922: qla2xxx: Fix discovery issues in FC-AL topology
Changes: Checks FC loop map when Get ID list returns no device

- FCD-1831: qla2xxx: Fix link failure in NIPV environment.
Changes: Remove NPIV host from directly being able to chip reset.

- FCD-XXX: qla2xxx: Fix DMA-API call trace on NVME LS requests with debug kernel
Changes: Remove DMA mapping from the driver

- FCD-XXX: qla2xxx: Fix KASAN use-after-free warning in qla24xx_sp_unmap
Changes: Remove stale fcport access in qla2x00_rel_sp

- FCD-XXX: qla2xxx: Fix KASAN out-of-bounds warning in qla_update_sp
Changes: Size for memcpy was corrected to use the right length.

- FCD-XXX: qla2xxx: Fix imbalance vha-&gt;vref_count
Chnages: Add an extra ref count for the task management paths.

- FCD-XXX: qla2xxx: Tweak Latency measurement
Changes: Move the time read further ahead to the start of queuecommand and
later to the point where it is just before scsi_done.

- FCD-XXX: qla2xxx: klockwork: Silent superfluous warning.
Changes: Remove superfluous Null check.

- FCD-XXX: qla2xxx: klockwork: Fix buffer overrun
Changes: Replace structure name to allow proper size calculation

- FCD-XXX: qla2xxx: Remove dead code (GNN ID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code (GPNID).
Changes: Remove stale/unused code.

- FCD-XXX: qla2xxx: Remove dead code.
Changes: Removing drport field and FCPORT_UPDATE_NEEDED, and EDIF_TICK_NEEDED signals

- FCD-XXX: qla2xxx: Do not select slow queue if USCM is enabled
Changes: Do not select slow queue whilie initializing cpu map

- FCD-XXX: Select HW queue depending on Tx CPU
Changes: Select qpair which is in correlation with Tx CPU

- FCD-XXX: qla2xxx: Add support for displaying I/O throttle information
Changes: Display the driver I/O throttle information along with VL information

- FCD-XXX: qla2xxx: USCM: Throttle only R/W commands for NVME
Changes: Throttle only read/write IOs.

- Bring back following reverted changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.


- 10.02.08.00.a2-k1 BH 06/19/2022
- FCD-XXX: qla2xxx: klockwork - Check valid rport returned by fc_bsg_to_rport
Changes: Check valid rport returned by fc_bsg_to_rport

- FCD-XXX: qla2xxx: klockwork - Check for a valid fcport pointer
Changes: Add a check for a valid fcport pointer at the time of exit

- FCD-XXX: qla2xxx: klockwork - Move fcport NULL check to avoid dereference
Changes: Move the fcport NULL check to avoid the dereference.

- FCD-1883: qla2xxx: USCM: Adapter shows "RDF Complete" when Link is down
Changes: Reset the flag, so that when USCM is negotiated, the CLI shows the correct status

- FCD-1846: qla2xxx: USCM: A log message while clearing stats
Changes: Add a log message while clearing USCM stats

- FCD-XXX: qla2xxx: USCM: VL-Reset FC device virtual lane priority to normal on a port flap
Changes: Reset the virtual lane to normal on a port flap, ISP reset

- FCD-XXX: qla2xxx: USCM: VL-Set target congestion before switching lanes
Changes: Set the target state before the lane switch.

- FCD-1752: qla2xxx: USCM: VL-Sysfs does not show Virtual Lane as enabled
Changes: extended flogi_acc can also be parsed correctly.

- FCD-1652: qla2xxx: Check if port is online before sending ELS
Changes: Check if port is online before sending ELS

- FCD-XXX: scsi: qla2xxx: Synchronize rport dev_loss_tmo setting

- 10.02.08.00.a1-k1 BH 05/27/2022
- FCD-XXX: qla2xxx: USCM: Virtual Lane, Fix PUN handling
Changes: Have a default priority range for each lane and ensure that the range is programmed correctly

- FCD-XXX: qla2xxx: USCM: Support for Virtual Lanes
Changes: Enable Virtual Lane support for Cisco switch

- 10.02.07.00-k1 BH 05/27/2022
- Non-alpha build

- 10.02.07.00.a19-k1 BH 05/21/2022
- FCD-XXX : qla2xxx: USCM: Throttling is not honored for NVMe
Changes: Enable NVMe READ/WRITE commands to be throttled

- FCD-XXX: qla2xxx: USCM: Add counters to track directional throttling
Changes: Add sysfs counters to have stats displayed for busy status returns.

- FCD-1801: qla2xxx: USCM: CP reads go to zero while doing directional throttling
Changes: Take into account the directional queue depth while returning a busy status to the stack.

- FCD-1809: qla2xxx: USCM: Restoring USCM Profile to default result in driver

- FCD-1798: qla2xxx: USCM: Profiles are not honored for peer congestion
Chnages: Apply the profile to each target (fcport) when the profile is changed.

Reverting the following changes:
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- 10.02.07.00.a18-k1 BH 05/12/2022
- FCD-1484: qla2xxx: Manufacturer details should be "Marvell Semiconductor, Inc."
Changes: Update Manufacturer details to indicate Marvell Semiconductors

- FCD-XXX: qla2xxx: USCM: Throttle only read and write commands
Changes: Throttle only read and write commands.

- FCD-XXX: qla2xxx: USCM: Do not clear throttle for Clear Cong FPIN.
Changes: Do not clear throttle when Clear Congestion FPIN is received.

- FCD-XXX: qla2xxx: USCM: Change default profile to Monitor
Changes: Set the default throttle profile as Monitor.

- FCD-XXX: qla2xxx: Fix few issues reported by klocwork tool

- 10.02.07.00.a17-k1 BH 05/06/2022
- FCD-1522: qla2xxx: USCM: Throughput drops to zero in Monitor mode
Changes: Restore qdepth based on monitor mode

- FCD-1315: qla2xxx: Fix erroneous mailbox timeout after pci error inject.
Changes: Clear wait for MB interrupt flag to prevent stale MB completion arriving

- FCD-1424: Remove verbose IO debug messages
Changes: Remove the IOCB debug messages for every IO

- FCD-XXX: Support for NVMe parameters in Auxiliary Image Status
Changes: Added new structure member, bit define and image status check.

- 10.02.07.00.a16-k1 BH 04/08/2022
- FCD-XXX: qla2xxx: qla2xxx: Add srb tracing
Changes: Add a separate driver internal trace to capture srb related info.

- FCD-XXX: qla2xxx: Add driver console messages tracing
Changes: Logs are captured by default in an internal trace buffer depends on setting

- FCD-XXX: qla2xxx: Add a generic tracing framework
Changes: A rotating number of messages are captured in a trace structure

- FCD-XXX: qla2xxx: Add debugfs create/delete helpers
Changes: Define a few helpful macros for creating debugfs files.

- FCD-1221: qla2xxx: USCM: Switch does not send FPINs after a EDC re-negotiation
Changes: Send Link Service Request Information wih the EDC response, along with the other descriptors.

- 10.02.07.00.a15-k1 BH 03/25/2022
- FCD-1249: qla2xxx: edif: Fix dropped IKE message.
Changes: Fixes IKE message being dropped due to error in
processing Purex IOCB and Continuation IOCBs.

- FCD-1457: qla2xxx: Zero undefined mailbox IN registers
Changes: Set zero to unuse register's value while requesting a new MB command.

- FCD-1425: qla2xxx: USCM: Seconds since last event showing incorrect value
Changes: Calculate delta time correctly

- FCD-1287: qla2xxx: Fix incorrect display of max frame size.
Changes: Save off the field of interest into separate location and convert into words.

- FCD-XXX: qla2xxx: Fix memory leak when reading tgt_port_database debugfs file
- FCD-XXX: qla2xxx: USCM: Do not reset SCM stats on a link bounce/ISP reset

- 10.02.07.00.a14-k1 BH 03/14/2022
- FCD-XXX: qla2xxx: Fix losing FCP-2 targets on long port disable with IOs
Changes: Fix this by accepting RSCN when the device is not online.

- FCD-XXX: qla2xxx: Fix losing target when it reappears during delete
Changes: Fix the issue by adding state checks before proceeding.

- FCD-XXX: qla2xxx: Fix losing FCP-2 targets during port perturbation tests
Changes: Fix was to ignore delete for FCP-2 devices in certain sequence.

- FCD-119: qla2xxx: Fix crash due to stale srb access around IO timeouts
Changes: Ensure srb is either returned during error IO timeout error escalation.
If that is not possible fail the escalation path.

- FCD-1132: qla2xxx: HPE3PAR: Fix IOCB resource count leak
Changes: Decrement FW IOCB resource count.

- FCD-1132: qla2xxx: Turn off MQ for 8G adapter.
Changes: For 8G adapter, multi queue was enabled accidentally.

- FCD-1385: Wind down adapter after pcie error.
Changes: Detect the PCIE error and returns all IO's to upper layers.

- FCD-1412: qla2xxx: Reset Congestion Warning/Alarm signals count.
Changes: Reset signals at every signal check boundary (1 sec).

- 10.02.07.00.a13-k1 BH 02/17/2022
- FCD-1353: qla2xx: a12/a11 driver compilation gives warning messages
Changes: Fix the fall through warning
- FCD-1342: qla2xxx: SL12SP5 a12 driver compilation issue observed
Changes: fallthrough macro is defined based on gcc version.

- 10.02.07.00.a12-k1 BH 02/09/2022
- FCD-XXX: qla2xxx: Reset USCM stats/state and throttling on RSCN
Changes: Reset USCM stats on getting an RSCN indicating a target port down.

- FCD-XXX: qla2xxx: Increase max limit of ql2xnvme_queues
Changes: Increase max limit of ql2xnvme_queues to (max_qpair-1)

- FCD-478: qla2xxx: Fix missing devices on a LOGO from F-Port
Changes: A call to logo all ports is made upon a F-Port LOGO.

- FCD-XXX: qla2xxx: Move NVMe traffic to the slow queue on target congestion
Changes: Steer the NVMe traffic to the slow Q on encountering target congestion

- FCD-348: qla2xxx: edif: Fix slow session tear down.
Changes: As a work around, driver would trigger a session tear down where
it tell the local authentication application to also tear down.

- FCD-XXX: qla2xxx: edif: Tweak debug log.
Changes: Print AUTH ELS header to assist in debugging session's state of authentication app.

- FCD-207: qla2xxx: Fix stuck session of prli reject
Changes: Remove the stale code that cause the unintentional short cut.

- FCD-1197: qla2xxx: Throttling up is seen when port is down
Changes: Reset the stats/congestion state and the throttling algorithm on a link down event.

- FCD-348: qla2xxx: Reduce false trigger to login
Changes: Reduce the extra trigger to prevent multiple login to the same session.

- FCD-207: qla2xxx: edif : Reduce N2N thrashing at app_start time
Changes: make sure the old session is torn down before triggering a relogin.

- FCD-207: qla2xxx: Fix laggy FC remote port session recovery
Changes: allows the higher priority error recovery to run first before running
the lower priority heart beat check.

- FCD-XXX: qla2xxx: edif: Fix no logout on delete for n2n
Changes: Set a flag to turn on implicit logout early in the session recovery
to make sure it would go out in case of error.

- FCD-348: qla2xxx: edif: fix session thrash 2
Changes: prevents prli from going out before authentication app gives the ok

- FCD-348: qla2xxx: edif: tear down session if keys has been removed
Changes: If all keys for a session has been deleted then trigger a session tear down.

- FCD-348: qla2xxx: edif: fix no login after app start
Changes: Add a re-login trigger to relogin.

- FCD-207: qla2xxx: Fix hang due to session stuck
Changes: Break the requeue cycle and exit. The session deletion code will trigger a session relogin.

- FCD-348: qla2xxx: edif: reduce disruption due to multiple app start
Changes: Driver will skip over session tear down if app start is seen more than once.

- FCD-348: qla2xxx: edif: send logo for unexpected ike msg
Changes: Terminate/cleanup the AUTH ELS exchange.Follow with a pass through LOGO.

- FCD-348: qla2xxx: edif: Fix IO timeout due to over subscription
Changes: Track IOCB resources to prevent over subscription of IOCB resources

- FCD-207: qla2xxx: edif: fix n2n login retry for secure device
Changes: Add a few more login retries to revive the connection.

- FCD-1205: qla2xxx: Fix disk failure to rediscover
Changes: Set the online state before reporting to UL of the availability of the session.

- FCD-207: qla2xxx: Fix n2n inconsistent plogi
Changes: Delete the session to restart the connection, where ELS pass through
PLOGI would be used consistently.

- FCD-1267: qla2xxx: Fix crash during module load unload test
Changes: Driver correctly freeing a pre-allocated structure for purex packet handling

- FCD-XXX: qla2xxx: Fix missed DMA unmap for NVME ls requests.
Changes: Add an unmap call during ELS completion.

- FCD-1266: qla2xxx: Fix loss of NVME namespaces after driver reload test
Changes: Calling the localport registration under a mutex

- FCD-1212: qla2xxx: Host does not retry RDF when retries are exhausted and there is an incoming RDF
Changes: Reset the SCM ELS counters to zero once an RDF is received.

- FCD-XXX: qla2xxx: Restrict CPU-qpair mapping to work for NVMe only
- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
- FCD-XXX: qla2xxx: SCM: Add a bitmap for FPIN events.

- 10.02.07.00.a11-k1 BH 01/17/2022
- FCD-738: Fix T10 DIF performance on high end setup
Changes: Added high performing CRC-1 interface

- FCD-1182: qla2xxx: Fix initrd build error on RHEL 9
Changes: Updated the build script specific to RHEL 9

- FCD-XXX: qla2xxx: Fix incorrect latency counter display
Changes: Fix this by ignoring I/Os with unusually high latencies.

- FCD-207: qla2xxx: Fix n2n discovery issue with secure target
Changes: On app_start, driver will reset the login retry attempt count.

- FCD-1180: qla2xxx: Use correct feature type field during rffid processing
Changes: Driver sends RFF_ID for initiator type 28 i.e. NVMe insteads of SCSI two times

- FCD-1159: qla2xxx: Host doesn't retry the RDF/EDC when jammed with idle/CRC
Changes: Wake up the DPC thread from the timer context when EDC/RDF needs to be

- FCD-XXXX: qla2xxx: Build module with "-mindirect-branch=thunk-extern" option on RHEL 9

- 10.02.07.00.a10-k1 BH 01/06/2022
- FCD-XXX: qla2xxx: Support for changes in kernel 5.6 and above(rhel9.0)
Changes: Changes made specific to rhel9.0

- FCD-1136: qla2xxx: Throttling occurs even when USCM is disabled via CLI
Changes: Update flags that control USCM features, correctly on ISP reset

- FCD-1160: USCM continues to be active even if RDF response is jammed (and failed)
Changes: USCM flags are updated properly when port toggle and RDF completion happen

- 10.02.07.00.a9-k1 BH 01/03/2022
- FCD-1154: qla2xxx: Fix incorrect reporting of task management failure
Changes: Corrected endianness.

- 10.02.07.00.a8-k1 BH 12/23/2021
- FCD-814 : qla2xxx: Add a new v2 dport diagnostic feature.
Changes: Buffer size is increased to 1024 bytes and handle START/RESTART
command received from SDMAPI.

- FCD-XXX: qla2xxx: Change throttle up logic to be more aggressive.
Changes: Ramp up to faster initially, to get closer to the sweet spot quicker.
Be less prone to operating at lower bandwidth in case of a sudden workload spike.
Operate more conservatively (prioritize self over the network).

- FCD-XXX: qla2xxx: Do not track SCM stats for all ports in the zone
Changes: Track SCM stats just for the host and the target

- FCD-XXX: qla2xxx: Stats for FPIN with event type "Lost Credit" not incremented.
Changes: Add incrementing of "Lost Credit" stats.

- FCD-684: qla2xxx: Fix link down when connected to AG fabric with FAA enabled
Changes: Remove setting PUN and VL support bits in init control block.

- FCD-1004: qla2xxx: Debug message improvement when changing SCM profile.
Changes: Use profile names when changing profiles

- FCD-868: qla2xxx: lockdown: "Unsupported Firmware" message
Changes: checked different BITs for checking lockdown feature.

- FCD-682: qla2xxx: tcm_qla2xxx driver load fails with "Invalid argument" error
Changes: As tcm_qla2xxx is untested/unused, make it a dummy driver
and reduce unncessary noise created by this.

- FCD-886: qla2xxx: Hard Lockup on Unload/Load task with serial log enabled
Changes: Hard lockup is seen because serial console driver crashed because of
excessive logging. It was finalized to document this as known issues.

- FCD-XXX: qla2xxx: Apply USCM profile change immediately

- 10.02.07.00.a7-k1 BH 11/05/2021
- FCD-926: qla2xxx: lockdown: lower debug severity messages
- FCD-824: qla2xxx: lower debug severity message for fw lockdown
Changes: This patch lower the severity of various log messages.

- FCD-XXX: qla2xxx: Send LS_ACC for an incoming RDF
Changes: Send the LS_ACC and the new RDF separately

- FCD-721: qla2xxx: Set Max queue depth based on data direction.
Changes: Max q depth for Initiator tracks Reads (per port) and Fcport tracks Writes (per fcport).

- FCD-701: qla2xxx: Fix device reconnect in loop topology
Changes: Fix by taking the main login path that acquires device handle.

- FCD-XXX: qla2xxx: Add ql2xnvme_queues module parameter to configure number of NVME queues


- 10.02.07.00.a6-k1 BH 10/08/2021
- FCD-786: Shown wrong FDMI data for 64G adaptor
Changes: qla2xxx: Corrected transmission speed mask values for FC

- FCD-717: add retry for exe fw
Changes: qla2xxx: Driver will retry Exec FW command up to 4 retries

- FCD-XXX: qla2xxx: Compile out map queue changes if present in nvme-fc

- 10.02.07.00.a5-k1 BH 10/01/2021
- FCD-740: Fix scheduling while atomic
Changes: qla2xxx: schedule the call to fc_remote_port_delete in non-interrupt context

- FCD-691: Fix premature hw access after pci error
Changes: qla2xxx: Check error condition still persist and/or wait until the OS to give the resume signal

- FCD-756: Fix excessive messages during device logout
Changes: qla2xxx: disable printing IO error messages by default

- FCD-XXX: qla2xxx: abort fw dump if soft reset fail
- FCD-XXX: qla2xxx: USCM: Retry USCM ELS for Logical busy error code
- FCD-XXX: qla2xxx: USCM: USCM profile reset to Driver defaults
- FCD-XXX: qla2xxx: Fix warning message due to adisc is being flush at /var/log/messages

- 10.02.07.00.a4-k1 BH 09/20/2021
- FCD-721: Revert code that keeps track of queue-depth directionally.
Reason: Observing issue while q-depth accounting

- FCD-XXX: Cleanup stale code.
Changes: qla2xxx: Remove unused experimental code that uses
explicit PRLO as a way to tear down session.

- FCD-XXX: edif: remove old doorbell interface
Changes: qla2xxx:driver has implemented a new doorbell mechanism via bsg.

- FCD-348: edif: add retry for els pass through
Changes: qla2xxx: edif: Add additional retries to reduce higher level recovery.

- FCD-XXX: edif: Synchronize NPIV deletion with authentication application
Changes: qla2xxx: Notify authentication application of a NPIV deletion event is about to occur.

- FCD-XXX: edif: Fix potential stuck session in sa update
Changes: qla2xxx: Set flag properly for any attempt to relogin.

- FCD-704: The external flag for tcm_qla2xxx was not set.
qla2xxx: Add tcm_qla2xxx to externally supported module list.

- 10.02.07.00.a3-k1 BH 09/08/2021
- FCD-XXX: qla2xxx: edif: wait for app to ack on sess down
Changes: On session deletion, wait for app to acknowledge before moving on.

- FCD-XXX: qla2xxx: edif: fix edif bsg
Changes: Properly fill out the reply_payload_rcv_len field.

- FCD-XXX: qla2xxx: edif: fix inconsistent check of db_flags
Changes: Replace value check with bit flag check.

- FCD-XXX: qla2xxx: edif: increase ELS payload
Changes: Adjust memory buffer size to be able to handle max ELS payload.

- FCD-343: qla2xxx: turn off target reset during issue_lip
Changes: driver sends additional target reset to remote device before resetting the link.

- FCD-XXX: qla2xxx: edif: Reduce Initiator-Initiator thrashing.
Changes: Reduce unnecessary stress for authentication application to deal with unused connections.

- FCD-XXX: qla2xxx: fix gnl list corruption
Changes: move lock deletion behind lock.

- FCD-XXX: qla2xxx: edif: flush stale events and msgs on session down
Changes: Prevents authentication application from having to process stale data.

- FCD-XXX: qla2xxx: edif: reduces thrashing of the connection.
- FCD-XXX: qla2xxx: edif: tweak trace message
- FCD-XXX: qla2xxx: edif: fix app start delay
- FCD-XXX: qla2xxx: USCM: Handle SCM ELS from switch
- FCD-XXX: qla2xxx: edif: fix app start fail

- 10.02.07.00.a2-k1 BH 09/02/2021
- FCD-156: qla2xxx: 3PAR: Fix out of bound mem access
Changes: Add additional check to make sure the range of memory

- FCD-624: qla2xxx: Source driver gives compilation error on RHEL8.5
Changes: Offending code on tcm_qla2xxx module has been removed

- FCD-xxx: qla2xxx: Fix use after free
Changes: Would check for command is aborted / completed by FW before exiting the call.

- ER148553: qla2xxx: relogin during fabric disturbance
Changes : Set the scan_need flag to indicate a session

- FCD-464: qla2xxx: Fix race between timeout handler and completion handler
Changes: One reference is taken for the normal code path and one for the timeout path

- FCD-453: Fix FC-NVME register localport failure.
Changes: Module initialization is added to nvme_fc_port_template

- FCD-XXX: qla2xxx: Process responses in Tx path if any available for better performance
Changes: Call process_response_queue() in Tx path

- FCD-492: Kernel crashes when accessing port_speed sysfs file
Changes: CNA: Fix this by changing the lookup.

- FCD-XXX: qla2xxx: Refactor asynchronous command initialization
- FCD-XXX: qla2xxx: USCM - Add profile support for throttling IO
- FCD-XXX: qla2xxx: Move heart beat handling from dpc thread to workqueue
- FCD-XXX: USCM: Enhancement to throttle only read traffic during host congestion
and write traffic during target congestion.

- 10.02.07.00.a1-k1 BH 08/22/2021

- FCD-124: qla2xxx: edif: Use link event to wake up app
Changes: The link up event would notify app of the present of a new SCSI Host.

- FCD-299: qla2xxx: Fix crash in NVME abort path
Changes: Fixed the issue by removing stale access.

- FCD-XXX: qla2xxx: Display 16G only as supported speeds for 3830c card.
Changes: This card doesn't support lower speeds, hence,
update the fdmi and sysfs fields to display 16G only.

- FCD-226: qla2xxx: Update details for building kdump initrd in NVMe BFS.
Changes: Currently inbox driver doesn't support kdump/kexec kernel,
hence user need to update kdump initrd to have OOB driver part of it.

- FCD-372: qla2xxx: Anomaly in the congestion stats
Changes: Clear the signal counter on a qaucli clear

- FCD-279: Request QCC to check/report adapter's MCTP state
Changes: qla2xxx: Add support for mailbox passthru

- FCD-XXX: Perf improvement: Pick qpair such that Tx and Rx are processed on same CPU.
Changes: qla2xxx: Select qpair depending on which CPU post_cmd() gets called

- FCD-XXX: scsi: qla2xxx: Reserve extra IRQ vectors

- 10.02.06.02-k1 BH 08/11/2021
- FCD-511: Path does not go into "Marginal" state on receiving FPIN-LI
Change: qla2xxx: Pass the LI events to the scsi_transport_fc

- 10.02.06.01-k1 BH 07/27/2021
- ERXXXXXX: qla2xxx: Check for firmware capability before creating QPair.
Change: Move the check for FW attributes to right location. This check
is specific for ISP25XX.

- 10.02.06.00-k1 BH 07/21/2021
- ERXXXXXX: qla2xxx: Version number is changed from 10.02.06.00.a1-k1
to 10.02.06.00-k1

- 10.02.06.00.a1-k1 BH 06/29/2021
- FCD-297: Fix NVME session down detection
Change: qla2xxx: Session tear down and allow relogin to re-drive
the connection under condition

- ER148553/FCD-156: Fix NVME retry
Change: qla2xxx: Alternate back and forth on every PRLI failure
until login retry count has depleted or it is succeeded.

- FCD-316: System crash when number of CPUs forced to 2
- Change: qla2xxx: Sync queue idx with queue_pair_map idx.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.
- ERXXXXXX: qla2xxx: Readme: Remove workaround of forcing of INTa
mode for kdump kernel.

- ERXXXXXX: qla2xxx: Readme: Update OS details that supports NVMe BFS.


- FCD-316: System crash when number of CPUs forced to 2
Changes : qla2xxx: prevents unbalanced QP allocation where nr_hw_queues
is two less than the number of CPUs.
This fix needs both commits released on 10.02.05.00-k
and 10.02.06.00.a1-k against FCD-316

- FCD-268: Multiple USCM ELS are sent
- FCD-280: Fix issues reported by running a few Jammer tests
Changes: qla2xxx: Retry the USCM ELS 3 times when there are failures.

- FCD-172: build.sh: Fix udev script installation error

- ER148402: Install restrictions when binary rpm is already installed.
Changes: qla2xxx: Updated README file for documentation

- ERXXXXXX: qla2xxx: Support kdump kernel for NVMe BFS.
- ERXXXXXX: qla2xxx: Update README file for building kdump initrd in NVMe BFS.

- ER148402: Disallow install if qla2xxx rpm is installed.
Changes: qla2xxx: Prevent install from source if rpm is installed.

- FCD-230: Add additional debug logs
Changes: qla2xxx: Add additional logs to differentiate between
FW driver and driver driven ELS

-FCD-XXXX: Changes to support kdump kernel.
Changes: qla2xxx: Don't allocate fw dump for kexec kernel and
Allocate single Q for kexec kernel.

- FCD-227: Linux Driver order of RDF to follow EDC ELS

- FCD-225 - Qaucli fails to list scm stats for Qlipper

- FCD-172: fix udev rule
Changes: qla2xxx: permission of the rule file set to 644
- ER148529: NVMe initiator connected to brocade fabric are down
Changes: qla2xxx: Fix hang on NVME command timeouts.

- ER148531: SN1600Q/SN1610Q, Gen10PlusSnap4 - Async-login failed errors on BFS boot-up-QXCR1001796980
Changes: qla2xxx: Suppress unnecessary log messages during login

- ER148578: Observed that initiator is sending prli type 0x8 for for nvme ports
Changes: qla2xxx: fix NVME | FCP personality change.

- ER148141: Driver vmkmgt: Don't differentiate Signals and FPIN's for the Congestion counters when they detected.
Changes: qla2xxx: Split congestion warnings and alarms based on signals and FPINs

- ERXXXXXX: Add support for marginal path.
Changes: qla2xxx: Added support for eh_should_retry_cmd callback in qla2xxx host template.

- ERXXXXXX: scsi: qla2xxx: Flush all sessions on zone disable
- ERXXXXXX: scsi: qla2xxx: Fix memory size truncation
- ERXXXXXX: scsi: qla2xxx: Fix a NULL pointer dereference in an error path
- ERXXXXXX: qla2xxx: fix sparse warning.
- ERXXXXXX: qla2xxx: edif: do secure plogi when auth app is present
- ERXXXXXX: qla2xxx: Add license.
- ERXXXXXX: qla2xxx: USCM - Do not send EDC/RDF ELS when firmware has already sent it
- ERXXXXXX: qla2xxx: Inclusion words are applied on release note and readme file
- ERXXXXXX: qla2xxx: edif: add N2N support for EDIF
- ERXXXXXX: qla2xxx: Updated drelease.notes header
- ERXXXXXX: qla2xxx: Fix hang during NVME session tear down.
- ERXXXXXX: qla2xxx: USCM: Cleaned up a few debug messages
- ERXXXXXX: qla2xxx: edif: fix edif enable flag

- ER148546: USCM: QCC Cong Mgmt not available on port with FW:v9.07.00 and DVR:v10.02.05.00.a6-k
Changes: qla2xxx: setting the flags to indicate to the application that the RDF is complete and
SCM is supported.

- ERXXXXXX: Add heartbeat check
Changes: qla2xxx: Use 'no-op' mailbox command to check to see if FW is still responsive.

- ERXXXXXX: DEBUG: simulate FW hang.
Changes: qla2xxx: Driver will detect the hang and recover via hearbeat check.

- ERXXXXXX: qla2xxx: Check for FW attributes before enabling MQ.
- ERXXXXXX: qla2xxx: USCM Handle ELS errors from switch by retrying 3 times
- ERXXXXXX: scsi: qla2xxx: Correct the supported speeds for 16G Mezz card.


- ER148472: With NPIV ports, link bounce causes loss of strongSwan session at the target.
Changes: qla2xxx: : fix npiv create errorneous error
qla2xxx: EDIF: reject AUTH ELS on session down.
qla2xxx: edif: Fix stale session

- ER148478: System Crash while NPIV RAW IO ON VPORT LUNS on SLES15 SP3 + QLE 2692 + R7525
Changes: qla2xxx: fix unsafe removal from link list.

- ERXXXXXX: qla2xxx: USCM - Send EDC and RDF ELS from the driver

- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: v2: fix crash in PCIe error handling
- ER148123: Issue with Max secure connection with override_lower_limits
Changes: qla2xxx: v2: fix stuck session
- ER148402: SLES, Driver Install location is inconsistent.
Changes: qla2xxx: Fix driver install location for SLES

- ER148123: Issue with Max secure connection with override_lower_limits
set and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Changes: qla2xxx: edif: doorbell tweak

- ER148448: Issue w.r.t qaucli, where Remote type "Unknown" for eDIF env.
for qaucli2.4.0.build 20
Changes: qla2xxx: fix port type info

- ER148433: The log does not show a valid data rate while the link speed is 64G.
Changes: qla2xxx: fix debug print of 64G link speed.

- ER147650: 'show fdmi? command does not list ? OS Name and Version?
parameter for SLES12SP4-QXCR1001771822
Changes: qla2xxx: Show OS name and version in FDMI-1
- ER147707: Device recovery not happening and OS hungs on qla2xxx
Changes: qla2xxx: fix mailbox recovery during PCIE error
qla2xxx: v2: fix crash in PCIe error handling
- ERXXXXXX: qla2xxx: Changes to support FCP2 Target.
- ERXXXXXX: qla2xxx: include AER debug mask to default
- ERXXXXXX: qla2xxx: fixes for compilation on RH8.4
- ERXXXXXX: qla2xxx: Do logout even if fabric scan retries got exhausted.

- 10.02.05.00.a1-k1 BH 02/27/2021
- EDIF Changes:
- ER148247: issue with nvme-npiv env, once we delete npivs, after a while,
it is reducing strongswan connections.
Change: free sa index during npiv delete

- ER148123: Issue with Max secure connection with override_lower_limits set
and rekey/reauth with240/480-luns disconnected after 2 hr traffi
Change: adjust online|offline notification to app and
tweak LOGO on session down.
- ERXXXXXX: qla2xxx: edif: tweak log message
- ERXXXXXX: qla2xxx: edif: Redundant code (already set in qla_edb_node_alloc)

- ER147707: qla2xxx: Device recovery not happening and OS hungs on qla2xxx
Change: Fix RISC RESET completion polling.

- ER148111: qla2xxx: FCPowerKit reflects huge delays in CMDlets execution.
Change: Check lockdown functionality before requesting lockdown feature.

- ER148277: USCM: Linux Peer showing misleading 'Congested, throttling down,
permitted: 1', prior to 'Reached low watermark, permitted: 2':
- Change: Fix misleading debug message

- ERXXXXXX: adjust request/respond queue size for 28xx
- ERXXXXXX: qla2xxx: Change %p to %px in the log messages.

- 10.02.01.00.a15-k1 BH 11/12/2020
ERXXXXXX: qla2xxx: Updated README file for new module parameters

- 10.02.01.00.a14-k1 BH 11/06/2020

- ER146725: eDIF another driver panic running script: ./test_target_no_unload.sh
Change: qla2xxx: Fix crash in qla_nvme_abort_set_option.

- ER147771: Call Trace while shutting down the adapter ports (LINK DOWN).
Change: qla2xxx: Handle aborts correctly for port undergoing deletion.

- ERXXXXXX: qla2xxx: Add scsi_change_queue_depth to slave configure.

- 10.02.01.00.a13-k1 BH 10/28/2020

- ER147600: Cisco: rpd ELS cmd fail to fetch the speed capabilities
Change: qla2xxx: Used correct rdp spec, which was broken during code clean-up.

- ER147695: FC-NVMe target discovery fails when initator wwpn &lt; target wwpn in an N2N (Direct Attach) config
Change: qla2xxx: fix N2N + NVME connect retry fail

- ER147832: Issue with uSCM Linux with QCC CLI for some configuration
Change: qla2xxx: Show event severity only when device state is congested.

- ER147824 : scmr_stat sysfs node runs out of memory
Change: qla2xxx: Come up with a compact version of scmr_stat

- ER147823: NVMe IO is not getting throttled up or down.
Change: qla2xxx: Enable throttle control for NVMe targets for Peer Congestion.

- ERXXXXXX: qla2xxx: Count tgt short term link if link comes back before dev_loss_tmo.
- ERXXXXXX: qla2xxx: Correct the check for fcport while displaying target counters.
- ERXXXXXX: qla2xxx: Change trigger for host short term link down to dev loss tmo.
- ERXXXXXX: qla2xxx: Move an SCM log under a debug level.
- ERXXXXXX: qla2xxx: Set vendor_rsp[0] value.
- ERXXXXXX: qla2xxx: Make throttling messages more informative.

- 10.02.01.00.a12-k1 SK 10/15/2020
- ER147625: NVMe IO's are failing with Read/Write after LIP reset.
Change: qla2xxx:Return EBUSY until the remote port delete finishes.

- ER147653: Target side strongswan start/stop, make initiator crashed.
Change: qla2xxx: edif: v2 fix double bsg done.

- ER147791: USCM: clear option is not clearing hba alarm/warning, or clear cong or nvme target stats.
Change: qla2xxx: Clear Sev and NVMe Target Stats.

- ER147793: USCM: Throttling has wrong throttling up info and event period is not honored.
Change: qla2xxx: Fix Throttling algorithm regression.

- ER147759: NVMe Admin commands are getting throttled and causing admin queue failures.
Change: qla2xxx: Throttle NVMe I/O commands only.

- ERXXXXXX: qla2xxx: edif: fix aes_gmac mode.
- ERXXXXXX: qla2xxx: edif: v2: standardize on port_id_t for bsg api.
- ERXXXXXX: qla2xxx: edif: fix 4byte align.
- ERXXXXXX: qla2xxx: edif: fix ELS meta data.
- ERXXXXXX: qla2xxx: Clear Congestion State/Throttling during chip Reset.
- ERXXXXXX: qla2xxx: Clear SCM Severity as part of SCM Stats Clear.

- 10.02.00.02.a11-k1 BH 10/09/2020
- ER147734 : Lip reset on the isolated port causes server crash
Change: qla2xxx: Don't allow FW, MPI and lip reset on isolated port.

- ER147479 - PPC BE RH7.6 - qla2xxx driver loading - machine crashed.
Change: qla2xxx: Fixes for big endian machines

- ER147646: Call Trace observed while validating a MPI Pause test scenario.
Change: qla2xxx: Correct the WARN_ON check in qla_nvme_abort_set_option.

- ER147615: Throttling does not work with low I/Os.
Change: qla2xxx: Check and round off fractional I/Os to 1 on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: List NVMe targets under scmr_stats on ISP 27xx/28xx Series Adapters
- ERXXXXXX: qla2xxx: Don't check for port isolation during abort isp.
- ERXXXXXX: qla2xxx: SCM: Turn off SCM port parameter update mailbox command.
- ERXXXXXX: qla2xxx: Fix I/O failures during remote port toggle testing

- 10.02.00.02.a10-k1 BH 09/25/2020
SCM Changes:
- ERXXXXXX:
Changes - qla2xxx: Clear Congestion state when an RSCN is received/target is torn down.
qla2xxx: throttling algorithm improvement.
qla2xxx: Add throttling support for NVMe targets.

EDIF Changes:
- ERXXXXX: LUN loss on ipsec stop/start on target side.
Change: save Nport on receive of PLOGI
- ERXXXXX: fix ELS receive collision between physical and NPIV hosts.
Change: remove erroneous source Nport ID search.

- ER147570: FCP Performance Drop in latest driver for smaller IOs size.
Change: qla2xxx: Change WQ_UNBOUND to WQ_MEM_RECLAIM. WQ_MEM_RECLAIM : wq is guaranteed to have at least one execution context regardless of memory pressure.

- ER147632: QLE2774: RHEL 8.2 System crashes while upgrading he FW from 9.6.0 to 9.6.1 with QCC CLI build 12
Change: qla2xxx: Fix system crash on nvme abort path by checking sp of aborting command before accessing it.

- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
- ER147645: System panic while trying to capture debugfs stats for EED.
Change: qla2xxx: Check rport before accessing target number.

- ER147632: Fix potential stale mem access
Change: remove stale sp pointer reference

- CQXXXXXX: FPIN events are not readily decodable.
Change: qla2xxx: Make FPIN events prints human readable.

- ER146879: Add support to clear SCM Stats
Change: qla2xxx: Added support to clear SCM/SCMR Stats on ISP 27xx/28xx Series Adapters

- ERXXXXXX: qla2xxx: Allow get host stat during reset and sync reset.
- ERXXXXXX: qla2xxx: Set reset_cmd_err_cnt on reset failure only.
- ERXXXXXX: qla2xxx: Add isolated flag and return EPERM on isolation.
- ERXXXXXX: qla2xxx: Count short term link if link comes back in 10 sec.
- ERXXXXXX: qla2xxx: Don't check for fw_started while posting nvme command.
- ERXXXXXX: qla2xxx: Pass irq_offset to blk_mq_pci_map_queues API.
- ERXXXXXX: qla2xxx: lockdown: fix stale sp access.
- BZ1868688: qla2xxx: tear down session if FW say its down.

- 10.02.00.02.a9-k1 BH 09/03/2020
- ER147554 - sg_reset appears hung iterating over too many Qpairs.
Change - qla2xxx: limit interrupt vectors to number of cpu.

- ERXXXXX - qla2xxx: klocwork: Fix Bit field 'mpi_-' has one bit and is signed.

- ERXXXXX - qla2xxx: Change post del message from debug level to log level.

- ERXXXXX - qla2xxx: lockdown: fixup - Change error response as per API test.

- ERXXXXX - qla2xxx: Fix map_queue interface to use the correct blk-mq call.

- ERXXXXX - Added Structural changes for SCM Phase 2 support.
Change : qla2xxx: Update structure definitions for SCM to support backward compatibility.

- 10.02.00.02.a8-k1 BH 08/30/2020
- ERXXXXXX - Fix point-to-point (N2N) device discovery issue.
Change - qla2xxx: Fix point-to-point (N2N) device discovery issue.

- ERXXXXXX - To wait for ABTS response on I/O timeouts for NVMe.
Change - qla2xxx: To wait for ABTS response on I/O timeouts for NVMe.

- ER147523 - BSG stack trace and SCM display issues.
Change - SCM: Functional regression with a6 release.

- ER 147413 - edif: Fix issue with DIF enable target discovery.
Change - qla2xxx: edif: Fix issue with DIF enable target discovery.

- ER147480 clear ASYNC_ACTIVE flag to allow relogin.
Change - qla2xxx: fix stuck session.

- ERXXXXXX - lockdown: add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support

- 10.02.00.02.a7-k1 BH 08/22/2020
- ER147495 - edif changes
Change - qla2xxx: edif: fix nvme discovery failure
qla2xxx: edif: fix els corruption.

- ER147478 - SLES 15sp1 10.02...a6-k compile warning
Change - qla2xxx: Compilation changes for sles15sp1

- ERXXXXXX - add mpi flash lock down support
Change - qla2xxx: lockdown: add mpi flash lock down support
qla2xxx: lockdown: fix compile problem. do not submit

- ERXXXXXX: SCMR changes
Change - qla2xxx: SCMR: Correct scmr_outstanding_reqs accounting.
qla2xxx: SCM: Changes to separate current_events and current_state.
qla2xxx: SCMR: Increase local array size.

- ER147298 : USCM "Congestion Warning" counter regression
Change - qla2xxx: Correct FPIN Structure Definition (Severity).

- 10.02.00.02.a6-k1 BH 08/13/2020
- ERXXXXXX - fix crash on session cleanup + unload.
Change - qla2xxx: fix crash on session cleanup + unload.

- ER147329 - edif changes
Change - qla2xxx: edif: fix compile error. do not submit
qla2xxx: edif: fix double free on ELS send failure.
qla2xxx: edif: reject els if non secure device.
qla2xxx: edif: reject ELS on session down.
qla2xxx: edif: redefine purex dest addr to be more consistent.
qla2xxx: edif: tweak debug messages.
qla2xxx: edif: fix nvme+edif target connect problem.

- ER147460 - issue with Diag test on QCC CLI 2.4.0 build 10 with 10.2.00.2-a5 driver
Change - qla2xxx: edif: move bsg auth els into separate routine.
qla2xxx: edif: Fix error in BSG ELS path that has valid response data.

- ER147312 - Add support to report MPI FW state.
Change - qla2xxx: Add support to report MPI FW state.
qla2xxx: Fix reset of MPI firmware.
qla2xxx: Fix MPI reset needed message.

- ER147437 - With a5 driver observed warning messages.
Change - qla2xxx: Compilation changes for Citrix, rhel and sles.

- 10.02.00.02.a5-k1 BH 07/31/2020
- ER147418: server crash seen when trying to capture the debugfs stat on isolated port.
Change - qla2xxx: Don't process target debugfs stats if port is isolated.

- ERXXXXXX : Add SCM stats to scmr_stats node.
Change - qla2xxx: Add SCM stats to scmr_stats node.

- ER147419 : Fix crash due to request q pointer extraction failure.
Change - qla2xxx: Latency measurement patch.

- ERXXXXXX : edif: remove redundant field in port_id_t
Change -qla2xxx: edif: remove redundant field in port_id_t

- ER147331 - extract bbc from PLOGI template payload.
Change -qla2xxx: Fix buffer-buffer credit extraction error

- ERXXXXXX : Split qla2x00_configure_local_loop()
Change scsi: qla2xxx: Split qla2x00_configure_local_loop()

- ERXXXXXX : SCMR - Add I/O flow control.
Change - qla2xxx: SCMR - Add I/O flow control.

- 10.02.00.02.a4-k1 BH 07/23/2020
- ER147402 - Do not install nvme auto connect script if OS is installing it.
Change - qla2xxx: auto-connect scripts are install based on nvme-cli package.

- ERXXXXXX - Fixed return status of nvme fcp request.
Change - qla2xxx: Set NVME status code for failed NVME FCP request.

- ERXXXXXX - Multi-que support for TMF.
Change - qla2xxx: Multi-que support for TMF.

- ERXXXXXX ? edif changes
Change - qla2xxx: edif: simplify reserve/release of sa_index.
qla2xxx: edif: tweak debug log.
qla2xxx: edif: adjust ELS resp length.
qla2xxx: edif: send logo on app stop.
qla2xxx: edif: remove prlo in session deletion.
qla2xxx: edif: Fix app stop stall.

- ER147298 - USCM "Congestion Warning" counter regression w/.65 driver.
Change - qla2xxx: Correct fpin_descriptor definition.
qla2xxx: Consolidate EDIF &amp; SCM Purex Calls.

- ERXXXXXX - Calculate avg. time taken by different components for IO completion.
Change - qla2xxx: Latency measurement patch.

- 10.02.00.02.a3-k1 BH 07/16/2020
- ER147348 - Observing firmware dump while running qaucli -g post port isolation.
Change - qla2xxx: Don't check firmware state in case of chip is down.

- ER147338 - SLES: Driver load failed - modprobe: ERROR: module 'qla2xxx' is unsupported.
Change - qla2xxx: Add support for loading external modules on SuSE.

- ER147361 - System panic after enabling port isolated during TimeOutReset.
Change - qla2xxx: Synchronize the update the host counters using lock.

- ER147370 - Hardware Error counter not incrementing for MBX command timeout.
Change - qla2xxx: Update hardware error count for various error conditions.

- ERXXXXXX - The change is to help in debuggging.
Change - qla2xxx: Move some messages from debug to normal log level.

- ER147346 - Observed a call trace after port isolation.
Change - qla2xxx: Fix the call trace for flush workqueue.

- ERXXXXXX - For debug purpose.
Change - qla2xxx: Add error counters to debugfs node.

- 10.02.00.02.a2-k1 AE 07/10/2020
- ERXXXXXX - qla2xxx: Fix TCM compilation issues.
Change - Enabled build of tcm_qla2xxx module and fixed compile issues.

- ERXXXXXX - qla2xxx: edif : Added back the app_stop wait and avoid if link is down.
Change - Added wait during app stop.

- ERXXXXXX - qla2xxx: Set BIT_13 for NVMe Async events.
Change - Driver changes to skip SLER for Async event command.

- ER147323 - qla2xxx: Correct the check for sscanf return value.
Change - Driver updated to check version correctly.

- ERXXXXXX - qla2xxx: v2: Add EDIF support.
Change - Refactoring EDIF code for modularity.

- ER147298 - Congestion Warning/Alarm counters fail to increment
Change - Update driver to increment the counters for congestion signals.

- 10.02.00.02.a1-k1 AE 06/29/2020
- qla2xxx: Enable IOCB throttling by default.
- qla2xxx: Implementation to get and manage host, target stats and initiator port.
- qla2xxx: Add SLER and PI control support.
- qla2xxx: Do not log message when reading port speed via sysfs
- qla2xxx: fix null pointer access.
- qla2xxx: Use MPI hang trigger to do PEGTUNE halt.
- qla2xxx: Reduce erroneous error in link reset path
- qla2xxx: v2: fix stalled N2N reconnect.
- qla2xxx: Fix warnings on SLES12SP5.
- qla2xxx: Fix compilation issues on SLES15
- qla2xxx: Compilation Fixes for SLES15SP1.
- qla2xxx: Debugfs compilation issue fix for RH7.6.
- qla2xxx: Fix gcc test compile error output being printed.
- qla2xxx: Timestamp device online and offline transitions.
- qla2xxx: Add rport fields in debugfs.
- qla2xxx: Allow dev_loss_tmo setting for FC-NVMe devices.
- qla2xxx: Setup debugfs entries for remote ports.
- qla2xxx: Fix edif related compilation issue on RH7.6.
- Fixes for compilation on hpe branch
- qla2xxx: Compilation fixes for RH8.2
- qla2xxx: Compilation changes for RH7.6
- qla2xxx: Fixes for compilation on RH7.x I
- qla2xxx: bsg_job to bsg_job_t
- qla2xxx: I Unify source code to work with newer kernels.
- qla2xxx: Makefile changes from code-uni-devel-10x.
- qla2xxx: qla_edif file changes to compile the driver.
- qla2xxx: Fix compilation issues.
- qla2xxx: Fix Makefile issue.
- qla2xxx: fix compile error
- qla2xxx: Use explicit LOGO in target mode
- qla2xxx: Add EDIF support.
- qla2xxx: Addd edif related files.
- qla2xxx: Fix MPI failure AEN (8200) handling.
- qla2xxx: SCM - Backport optimizations and style changes from upstream work.
- qla2xxx: Fix warning in qla_attr.c file.
- qla2xxx: Fix nvme compilation error.
- qla2xxx: Fix crash in alloc w/GFP_KERNEL + interrupt
- Author : Quinn Tran &lt;qutran@marvell.com&gt; qla2xxx: v2: add iocb resource tracking.
- qla2xxx: Fix WARN_ON in qla_nvme_register_hba.
- qla2xxx: Allow ql2xextended_error_logging special value 1 to be set anytime.
- qla2xxx: Make tgt_port_database available in initiator mode.
- qla2xxx: reduce noisy debug message.
- qla2xxx: Fix mailbox Ch erroneous error
- qla2xxx: fix login timeout.
- qla2xxx: Accomodate for SCM FW attribute bit change.
- qla2xxx: post FC event (FPIN) to transport FPIN handler.
- qla2xxx: Hide fc_host_fpin_rcv kernel dependency.
- qla2xxx: Add changes to compile across various kernels.
- qla2xxx: Use active targets to update SCM stats.
- qla2xxx: Move SCM functions to qla_isr to keep changes local.
- qla2xxx: Code to process FLOGI ACC extended payload.
- qedf: Fix compilation issue - revisit.
- qla2xxx: SCM Phase 1 Implementation + 2 other patches.
- qla2xxx: Enable PUREX passthru post ISP reset.
- qla2xxx: Fix hang when issuing nvme disconnect-all in NPIV.
- qla2xxx: performance tweak
- scsi: qla2xxx: fix fcport null pointer access.
- fixup! qla2xxx: Fix unbound NVME response length.
- scsi: qla2xxx: Fix unbound NVME response length
- qla2xxx: Add host attribute to trigger MPI hang.
- qla2xxx: ONEOFF: silent dbg messages for good path io.
- qla2xxx: ONEOFF: fix pDIF detection
- qla2xxx: Snoop inquiry response atleast 168 bytes to determine proprietary DIF.
- qla2xxx: ONEOFF: add debug counters for T10-PI/DIF
- qla2xxx: ONEOFF: add MQ support for HP3PAR propritary T10-PI
- qla2xxx: HPE 3PAR private T10-PI support.
- qla2xxx: Check for fabric_priority flag during login
- qla2xxx: use iocb_fabric_priority flag
- qla2xxx: Fix QoS name and add debug logs
- qla2xxx: Correction to tests for iocb fabric and fcport qos.
- qla2xxx: Use -&gt;isp_ops-&gt;read_optrom() in qla26xx_read_qos_fcport_table().
- qla2xxx: QoS fcport table index initialization improvement.
- qla2xxx: Add QoS fcport table index to speed up search.
- qla2xxx: Reduce stack on qos fcport priority routines.
- qla2xxx: HPE: Register FDMI QOS
- qla2xxx: Add bsg interface for qos lun level bitmask.
- qla2xxx: Read E2E QoS fcport priority bitmasks from flash.
- qla2xxx: Abstract qos lun level mask for iocb cs_ctl field.
- qla2xxx: Add fabric priority qos lun iocb mechanism.
- qla2xxx: Implement CT command GFO (Get Fabric Object).
- qla2xxx: Add support for fabric priority per target.
- qla2xxx: fix mtcp dump collection failure.
- qla2xxx: Set Nport ID for N2N
- qla2xxx: Fix crash during device discovery.
- qla2xxx: Handle NVME status iocb correctly.
- qla2xxx: Remove restriction of FC T10-PI and NVME
- qla2xxx: serialize fc_port alloc in N2N
- qla2xxx: NPIV does not come up after FW dump.
- qla2xxx: fix RDP respond data format bug.
- qla2xxx: force semaphore on flash validation failure.
- qla2xxx: add more FW debug information
- qla2xxx: Revert: Disable T10-DIF feature with FC-NVMe during probe
- qla2xxx: Update BPM enablement semantics.
- qla2xxx: fix FW resource print error.
- qla2xxx: Use a dedicated interrupt handler for 'handshake-required' ISPs.
- qla2xxx: Ensure flash updates return possible failure status through bsg interface.
- qla2xxx: Improved secure flash support messages
- qla2xxx: fix flag passing error
- qla2xxx: Use FC generic update firmware options routine for ISP27xx.
- qla2xxx: Avoid setting firmware options twice in 24xx_update_fw_options.
- qla2xxX: Add 16.0GT for PCI String
- qla2xxx: Use FW_STARTED macro
- qla2xxx: Add fixes for mailbox command
- qla2xxx: Fix login IOCB flag
- qla2xxx: Save rscn_gen for new fcport
- qla2xxx: firmware option 3 is clobbered by speed set
- qla2xxx: ISP28xx active FW region
- qla2xxx: Add portname to print logs in qla24xx_logio_entry().
- qla2xxx: Correction to MB in-direction selection in qla2x00_echo_test().
- qla2xxx: Correction to selection of loopback/echo test.
- qla2xxx: Use endian macros to assign static fields in fwdump header.
- qla2xxx: Add Speed in SFP print information
- qla2xxx: Fix RDP response size
- qla2xxx: Handle cases for limiting RDP response payload length.
- qla2xxx: Add deferred queue for processing ABTS and RDP.
- qla2xxx: Cleanup ELS/PUREX iocb fields.
- qla2xxx: Add devid's and conditionals for 28xx.
- qla2xxx: Add vendor extended FDMI additions and amendments.
- qla2xxx: Provide separate RDP enable.
- qla2xxx: Add vendor extended RDP additions and amendments.
- qla2xxx: Add changes in preparation for vendor extended FDMI/RDP.
- qla2xxx: Add 2061 PCI ID
- qla2xxx: Remove all DIX-0 references
- qla2xxx: Add endianizer macro calls to fc host stats.
- qla2xxx: Add sysfs node for D-Port Diagnostics AEN data.
- qla2xxx: Move free of fcport out of interrupt context.
- qla2xxx: Add beacon LED config sysfs interface.
- qla2xxx: Add sysfs hooks for FC-NVMe autoconnect

- 10.01.00.22-k AE 06/29/2020
- Upstream driver as part of Linux 5.6</changelog>
  </package>
  <package pkgid="ea25a8226ff141532a1dc3a4778f00dd1f23fcb1ac30fab678bc04f45c5e7d8b" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.26" rel="030.sles15sp4"/>
  </package>
  <package pkgid="e41a1f2b9321e41a2857e030f66f68c28d2812adaf614f132ddbdf036ae9b84b" name="smartpqi-kmp-default" arch="x86_64">
    <version epoch="0" ver="2.1.26" rel="030.sles15sp5"/>
  </package>
  <package pkgid="81d8c90b05c90544cc8666a6a49796638aeedf583bca8ab949ccfc09ef4912eb" name="ssa" arch="x86_64">
    <version epoch="0" ver="6.30" rel="8.0"/>
    <changelog author="Ver:6.30-8.0" date="1697025600">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="5175275038fb4f01148bfde8059f06a2671cc9ae408dc91b70c935ea9811844d" name="ssacli" arch="x86_64">
    <version epoch="0" ver="6.30" rel="8.0"/>
    <changelog author="Ver:6.30-8.0" date="1697025600">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="0748a1ae449538838087701b0266fcd7d951d01c63b1eca4dcb1a2430753043d" name="ssaducli" arch="x86_64">
    <version epoch="0" ver="6.30" rel="8.0"/>
    <changelog author="Ver:6.30-8.0" date="1697025600">- Please see user documentation for details. (Severity: Low)</changelog>
  </package>
  <package pkgid="bc033840a1d630858f432871ccdf5e7bea7d35b16716a6ed857e5d60f18880f4" name="storcli" arch="noarch">
    <version epoch="0" ver="007.2613.0000.0000" rel="1"/>
  </package>
  <package pkgid="1a541d540b548bd19dd48ce0fe02d9e68aac19a8d9272e9d360829a6a72076a3" name="sut" arch="x86_64">
    <version epoch="0" ver="5.0.0" rel="13.linux"/>
  </package>
  <package pkgid="0a27567320692922558ebfdb3a2f1131317b2d905e0de7c73870c840a62c72de" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.139k_k5.14.21_150400.22" rel="2.sles15sp4"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
  <package pkgid="b3b6b7e29e83f6d5107da467cb2ecd76976a4c9cb0bfe69303de95bff7cc3908" name="tg3-kmp-default" arch="x86_64">
    <version epoch="0" ver="3.139k_k5.14.21_150500.53" rel="2.sles15sp5"/>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137r" date="1497355200">- Add workaround for MRRS of 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137s" date="1498219200">- Add support for RHEL 7.4 and SLES12SP2 (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137t" date="1502884800">- Add support to notify min/max MTUs through min_mtu &amp; max_mtu (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137u" date="1504785600">- Add support to overide clock for 5762  (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137v" date="1514808000">- Backport upstream patches  (Severity:Medium)
- Add PHY reset workaround in change MTU path for 5717/19/20  (Severity:Medium)
- Update the copyright (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137w" date="1517227200">- Add SLES 15 support  (Severity:Medium)
- Add RHEL 7.5 support (Severity:Medium)
- Fix RHEL 6.4 compilation (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137x" date="1530619200">- Add Ubuntu 18.04 support  (Severity:Minor)
- Fix race between tg3_get_stats64() and tg3_free_consistent() (Severity:Minor)
- Avoid usleep_range() with holding spin lock (Severity:Minor)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137y" date="1539259200">- Add private ioctl support for register read/write (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.137z" date="1549368000">- Add RHEL 8.0 support (Severity:Medium)</changelog>
    <changelog author="Siva Reddy Kallam &lt;siva.kallam@broadcom.com&gt; 3.138a" date="1550232000">- Fix Panic with SLES12SP3 (Severity:Minor)</changelog>
  </package>
</otherdata>
</manifest>
