<?xml version="1.0" encoding="UTF-8"?>
<manifest schema_version="2.0.0.0">
  <revision_history>
    <product_version>
      <id product="fac6c21a4a1e47499a956ff93dccfbd6" version="a667fb329020427aab645ab7a92dd413" lucid_version="qlbb.rhel8@8.55.5.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="8.55.5.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 8 update 3 and 8 update 2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue where the driver fails to load in NPAR mode when RoCE Data Center Quantized Congestion Notification (DCQCN) is enabled.</li>
	<li>This product corrects an issue ethernet data rate limiting unable on VFs.</li>
	<li>This product addresses a system crash seen when injecting a fw_assert on a NIC PF.</li>
	<li>This product addresses a system crash seen when limiting number of MSI-X interrupt vectors as requested for VFs</li>
	<li>This product addresses a system crash seen when unloading and reloading the RoCE driver only.</li>
	<li>This product addresses a system crash seen during multiple reboots of virtual machines using VFs and RDMA.</li>
	<li>This product addresses a the connection recover failed with heavy traffic</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.50.25.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat&nbsp; Enterprise Linux Server&nbsp;8 update 1.</li>
	<li>This product now adds PCIe Advanced Error Recovery (AER) support</li>
	<li>This product now supports RoCE bonding mode</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue which system crash after unloading and reloading only roce driver</li>
	<li>This product corrects an issue which VF RDMA system crash in overnight reboot test on multiple VMs</li>
	<li>This product corrects an issue which VMs crash randomly upon advanced property disable/enable with Max VFs enumerated on all PFs</li>
	<li>This product corrects an issue which iSCSI BFS system fails to reboot if one port is down and reboot is attempted</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dab6093d4d7545e892501476a1f6d448" version="1387201922974cc1af042d05cbc58648" lucid_version="MO000400JWUFT_MO000800JWUFU_MO001600JWUFV_x64@HPD3(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This release corrects logical block address mismatches that could results in partial or total data loss.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6559625804344daab70667e2f1b0b044" version="e8e50297b9dd4dccb457e9d35033faad" lucid_version="MB004000JWWQB_MB002000JWWQA_MB001000JWWPV_x64@HPD4(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update includes a fix that prevents unrecoverable read errors in highly localized write intensive workload, and a new servo code revision that improves performance under specific vibration conditions.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="393089474d234baf8404a8ee98140881" version="fa817827e0b3422e97e551d8dc246c9c" lucid_version="U14.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3ab4de78da484144892d6ddcd8fd9b97" version="7cba14b9508d40b3ae58ccf25ec8ceea" lucid_version="ixgbe.sles15@5.9.4-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.9.4-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Suse Linux Enterprise Server 15 Service Pack 2</li>
	<li>This product enhances reliability via adding support for new mailbox communication between PF(Physical Function) and VF(Virtual Function) and remove its potential flaws that may lead to the undefined or faulty behavior</li>
	<li>This product enhances compatibility where new mailbox api implementation is alo compatible with old drivers</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.7.1-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product update Linux kernel documentation and Configure IRQ affinity tools</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dbdc578953024bf9bb26afb2d6d4cd6a" version="891be3a8fce947598fd565f62994d3c7" lucid_version="VR000150GWEPP_VR000480GWEPR_ESXi@HPG1(F)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a timing issue which can cause the drive to become non-functional.</li>
	<li>Fixes VPD Log D0h reported drive Sanitize times.</li>
	<li>Adds support for Security Log Page BBh.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a timing issue which can cause the drive to become non-functional.</li>
	<li>Fixes VPD Log D0h reported drive Sanitize times.Â </li>
	<li>Adds support for Security Log Page BBh.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cf9ee3d9e8f04b18823882812129b4e0" version="a380b1d743374d0ab10a6718cab5b423" lucid_version="MB8000JFECQ_x64@HPD7(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="195ed5d18cb04288998708cea17b124d" version="1de8a7dd85014090b70a94394a614cc4" lucid_version="U24.linux@1.60_01-22-2018(B)__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="1.60_01-22-2018" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.60(B) contains updates to the component packaging and is functionally equivalent to ver. 1.60. It is not necessary to upgrade with Revision B if a previous component Revision was used to upgrade the firmware to version 1.60.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation. Additional information is available from Intel&rsquo;s Security Exploit Newsroom, <a href="https://newsroom.intel.com/press-kits/security-exploits-intel-products/">https://newsroom.intel.com/press-kits/security-exploits-intel-products/</a>.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Updated the Intel processor microcode to the latest version.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.60_01-22-2018" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation. Additional information is available from Intel&rsquo;s Security Exploit Newsroom, <a href="https://newsroom.intel.com/press-kits/security-exploits-intel-products/">https://newsroom.intel.com/press-kits/security-exploits-intel-products/</a>.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Updated the Intel processor microcode to the latest version.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="432284a4a7d540b6ab240935dd40f590" version="662daac797f047d5b31b4cfd6b334e67" lucid_version="MLNX_Open_Ethernet_NIC_MFT_FW_package.esxi65@1.0.4__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is&nbsp;updated to 14.29.1016:</strong></p>

<p>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)<br />
P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</p>

<p><strong>Firmware for the following devices is&nbsp;updated to 16.29.1016:</strong></p>

<p>P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)<br />
P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)<br />
P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)</p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<p><strong>New Feature and Changes in Version 14.29.1016 and 16.29.1016:</strong></p>

<ul style="list-style-type:square">
	<li>Ethernet wqe_too_small Mode: A per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p style="margin-left:40px">Added support for the following features:</p>

<ul style="list-style-type:square">
	<li>cq_overrun counter: The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>Enabled the capability to allow Virtual Functions to send Pause Frames packets. (Beta)</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
</ul>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<ul style="list-style-type:square">
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p style="margin-left:40px">Added support for the following features:</p>

<ul style="list-style-type:square">
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats:</li>
	<li>Responder Mini CQE With Flow Tag Layout.</li>
	<li>Responder Mini CQE With l3_l4_info Layout.</li>
	<li>Steering DP hash flow groups.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 14.29.1016 and 16.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that caused packets to drop due to header size issues and/or failing checks. This issue was caused due to a Linux issue that caused VFs to set the wrong header size value in wqe_inline_header_mode input.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) might take longer than when MKEY_BY_NAME was disabled.</li>
	<li>In rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that caused the eth_wqe_too_small counter to count ODP page faults.</li>
	<li>A low performance was observed after enabling the RoCE Accelerator capability.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is&nbsp;updated to 14.27.4000:</strong></p>

<p>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)<br />
P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</p>

<p><strong>Firmware for the following devices is&nbsp;updated to 16.27.2008:</strong></p>

<p>P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)<br />
P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)<br />
P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)</p>

<p><strong>New Feature and Changes in Version 14.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observerd while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6227fd0bddb244e4842587fb56f2e5ab" version="25695862758646df99223672f0eab786" lucid_version="qla2xxx.rhel7.x86_64@10.02.01.00.a14-k1__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.01.00.a14-k1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 10.02.01.00.a14-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.01.00.64.07.6-k1a" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial driver for RedHat Enterprise Linux Server&nbsp;7 update&nbsp;8 version&nbsp;10.01.00.64.07.6-k1a</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="83fed5e4a427414fb0792283dd57ec37" version="62bc5eaa23ef4d089893fce919a6c61d" lucid_version="lpfc.sles15.x86_64@12.8.352.11__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.275.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.6.275.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b23cbcef087a471c988db0eccfc20ffd" version="79c1738548ae47adb3d91555ea24d00e" lucid_version="MB8000JFECQ_x64@HPD7(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="05f0508175404d989c50e4f9a4e09a23" version="c7019b92936b44c4b1998df780ffcc6f" lucid_version="IEGen10.Linux@0.2.2.0-rev1__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="0.2.2.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None  <P><B>Firmware Dependencies:</B></P>None  <P><B>Problems Fixed:</B></P>Addressed an extremely rare issue where Processor or Memory temperature reporting may not be collected properly by the platform and the system fans may be running faster than expected. This issue has been seen occasionally after a server reboot and is typically corrected with a subsequent server reboot. <P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0.2.2.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None  <P><B>Firmware Dependencies:</B></P>None  <P><B>Problems Fixed:</B></P>Addressed an extremely rare issue where Processor or Memory temperature reporting may not be collected properly by the platform and the system fans may be running faster than expected. This issue has been seen occasionally after a server reboot and is typically corrected with a subsequent server reboot. <P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="51c52bf006bd4c60b09797563ff886bf" version="ac75ab6c9d9e4f8e8522e30feda93f57" lucid_version="ssacli.linux.x64@5.10.44.0__pubsw-linux_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.10.44.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Build</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ecc46179b9da4907abbf4738a44b1dc2" version="16bba50e634d45d9b60de2834208dcc7" lucid_version="mlnx_en_roce.sles15sp1.x86_64.rpm@4.9(A)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.9" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c565c3f6bc0f4964b8b59efe8bfdfdea" version="522ca652661446d0b9a16e8a69874b27" lucid_version="VK0240GEPQN_VK0480GEPQP_VK0960GEPQQ_ESXi@HPG1(I)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8fe22752c5324386870794853904b4ba" version="a23006bfb53f41f48196f7696b780a3d" lucid_version="isut.windows_64@2.8.0.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="2.8.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.7.1.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3a4168637f45404b864aa9e998210305" version="aeb879adcbac43ab850b8ca21745c4c1" lucid_version="HPE-CNA-FC-Emulex-Enablement.sles15.x86_64@12.8.352.11__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.272.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 12.6.272.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4aaa1b96312a4790820f2c40ac3eb0e7" version="f0051d86bc2c4ee8b6032d4db68c3727" lucid_version="MM1000JFJTH_ESXi@HPD3(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="G" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (F)" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eb8218bf97ea450eb1b29a8724433034" version="f8e9174a5e9e4083a79418a5528d2a39" lucid_version="mlnx_mft.sles15sp1.x86_64.rpm@4.16__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.15" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fc2945bc3e5744fea9d120a012546560" version="612d986245eb418180a1c9d3fea5c419" lucid_version="MB014000GWUDA_x64@HPG2(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="23c569ea92fb47f091a7a0c891acff72" version="c4e0b2f63e954d2fbb210fe9b7a28c51" lucid_version="FWPKG-P25960-B21@22.29.1016__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="22.29.1016" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New Features and Changes in Version 22.29.1016:</strong></p>

<ul>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Optimized vDPA performance for PPS in scalability of up to 127 devices per port.</li>
	<li>When using a Multi-Host device, the firmware can now discover who is the external SmartNIC host (the Embedded CPU PF (ECPF) ) with the highest index that is responsible for performing offload activities to the adapter card</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Eye-Opening: supported only when using NRZ signal. (Beta)</li>
	<li>Option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order. To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command and set DPP relevant attributes.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>Error statistics and reporting for vDPA.</li>
	<li>IPv6 TSO offload.&nbsp;</li>
</ul>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 22.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR</li>
	<li>&quot;iperf3&quot; and&nbsp;&quot;iperf3 -l 512&quot;&nbsp; issue fixed&nbsp;from having traffic for virtio hardware offload solution .</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="783998957ee142cfa68787b55e3611e4" version="351ca9dbbe71465f92bbe5e648d929bc" lucid_version="emulex.cna.fw.esxi67_bl@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">Updated CNA (XE100 series) firmware</p>

<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650FLB Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650M Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="683278c3722a411eb75e30e9eb4f543d" version="817cd10a4a464dbd952f0d6cfd33ee30" lucid_version="intel_vf.w2k19@1.12.9.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.12.9.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation library iavfmsg.dll.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.11.14.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fe91742b3a574fb18dfddbbd9fae74ba" version="12a40ca3f52e478c8bb3262962e84383" lucid_version="P230i_P430_P431_P731m_P830i_P830_ESXi@5.02(B)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.02" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for the ESXI OS7.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.02 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for the ESXI OS7.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8e395b40b6dc47ff9696c46179cb8065" version="1a1af9dc05eb4548a8669347b5620e98" lucid_version="P220i_P222_P420i_P421_P721m_P822.Lin_x64@8.32-rev1__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="8.32" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Improved accuracy of drive temperature reporting feature</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>System can potentially stop responding with no lockup code due to livelock condition where the RAID Stack thread is polling a queue for a completion to be returned by the base code firmware</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.32" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Improved accuracy of drive temperature reporting feature</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>System can potentially stop responding with no lockup code due to livelock condition where the RAID Stack thread is polling a queue for a completion to be returned by the base code firmware</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1120be85411a4c4091bc1cad7f1e1af8" version="38a828dcb5944a6f820916bfd8f83aa9" lucid_version="be2iscsi.rhel7.x86_64@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7 Update 8 and&nbsp;Red Hat Enterprise Linux 7 Update 9</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="da6c398c130f48f9a5a32bd3c9213a90" version="78848b4558d24304a5da6fe87a1d068d" lucid_version="MLNX_VPI_CX4_CX5_HCA_FW_package.x64@1.0.10__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.10" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.28.1002:</strong></p>

<p>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)<br />
825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 12.28.1002:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>Firmware for the following devices are updated to 16.29.1016:</strong></p>

<p>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)<br />
872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compared to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Steering DP hash flow groups.</li>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>PCIe Rx modifications to prevent the adapter cards from disappearing from the system.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
	<li>cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>[Beta]&nbsp;Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that prevented&nbsp;VXLAN packets with svlan/ cvlan tag from being matched.</li>
	<li>An issue that caused the&nbsp;eth_wqe_too_small counter to count&nbsp;ODP (On-Demand Paging) page faults.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>An issue that resulted in low performance after enabling the RoCE Accelerator capability. Note:&nbsp;The fix is available when all ports are set as Ethernet.&nbsp;</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.</li>
	<li>An issue that caused&nbsp;the device to go to down IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.&nbsp;</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.28.1002:</strong></p>

<ul>
	<li>An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.9" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.27.4000:</strong></p>

<p>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)<br />
825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 12.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>Firmware for the following devices are updated to 16.27.2008:</strong></p>

<p>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)<br />
872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observerd while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e4b6ca2c49674535912553cede176d16" version="3b57be0361de4a4daf99b0ee70e63cd6" lucid_version="VO007680JWCNK_VO015300JWCNL_ESXi@HPD8(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (C)" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:Â <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="875c48447044433ba822fd2b79f25cb2" version="2e44b0418d0c49cf909bbec08868dbf0" lucid_version="igbn.vmware65@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which handling duplex value passed of ESXi command.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.12.20" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where race condition during NIC adapter reset.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="82cd9f1b504a4d3798c759e1d18439aa" version="1726aa4798124e27907a018ff0dd21f4" lucid_version="MO0400JFFCF_MO0800JFFCH_MO1600JFFCK_x64@HPD9(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9fd1abd8973f4c09aa450e541dc4ee41" version="28838b27e63a4025af753343141d0d8d" lucid_version="VO000960RWUEV_VO001920RWUFA_VO003840RWUFB_x64@HPD3(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a2d50341a55d404a82473ce007636a93" version="3d3a03bb29464a1085df4eadc4305dac" lucid_version="D8000.fwsc.linux_x64@0111__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="0111" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of Rhel 7.8&nbsp;</p>
	</li>
	<li>
	<p>Added support of Rhel 8.2&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP2</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>Incorrect programming of the&nbsp;PHY ERROR COUNTERS parameter caused the amber LED to be lit, resulting in a false warning. The counter condition was corrected and the amber LED now functions correctly.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v191365/D8000_v0111.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0107" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of Rhel 7.8&nbsp;</p>
	</li>
	<li>
	<p>Added support of Rhel 8.2&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP2</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>In STD INQUIRY RESPONSE, the ErrM bit was always being set. The ErrM bit indicates that the enclosure firmware detects a mismatch in any of its package versions and the firmware version of a FRU component. The issue was due to an incorrect version of PSU firmware being included and that has been fixed.</p>
	</li>
	<li>
	<p>After installing the latest firmware on the enclosure I/O modules, the SES targets could not be discovered on the host. The virtual phy bit in SMP DISCOVER RESPONSE, which is used by the Microchip smartpqi HBA, was det for the virtual phy of the I/O module.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v183134/D8000_P20366-004.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="972a94402aa14188aa7633893c7137b6" version="98525e45652e462492bcb8d13717e82b" lucid_version="U33.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="871bd1fc79994166a0695e4fb3b5fd65" version="db84dc1e7f2e4195af4b0d92decaa8db" lucid_version="A46.Linux@2.42_02-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>System Programable Logic CPLD version 34<P><B>Problems Fixed:</B></P>Addressed an issue that could cause a slight degradation of performance.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.38_11-06-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the server may encounter an Uncorrectable Machine Check Exception (UMCE) with a Bank of 0x00000005 or an Uncorrectable PCI Express Error with status 0x00040000 or 0x00010000. These errors will result in either an unexpected reset of the server or the server becoming unresponsive (such as Blue Screen with Windows, Purple Screen with VMware, or Kernel Panic with Linux).  This revision of the System ROM includes the latest revision of AMD firmware which addresses this issue.  This issue is not unique to HPE servers.<p>Addressed an issue where the chassis name was not being reported for inventory control.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aedaa041caed4345872545de3f1efa40" version="4909c3817b444532baa932e1fa19a095" lucid_version="MM1000JFJTH_x64@HPD3(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (E)" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a8417355844c4be0a58d7ebc978d6631" version="2a4abf5d38e94e11958e9959e1668384" lucid_version="ixt.w2k16@4.1.199.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.199.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px">This product now supports the following network adapters:</p>

<ul style="list-style-type:square">
	<li>HPE Ethernet 10Gb 2-port 561FLR-T Adapter</li>
	<li>HPE Ethernet 10Gb 2-port 561T Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1.76.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product has been built with a new installer that prevents its installation on systems running Windows Server 2019.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ec0645c5197f4d97aa2ef8ed23e39857" version="bf2e1b610304468b9d6dacd438eff39a" lucid_version="ixgben.vmware67@2020.09.14__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.09.14" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which notification from Link Partner when executed Link Flow Control settings.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.12.20" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects a recursion termination condition so that recursion correctly ends in the case of PCIe link down.<br />
This product addresses an issue where the ixgben driver has high CPU overhead when an SFP+ module is absent.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="640faf1092b548cf896ce4ae4d6b3ae8" version="b7d1a92bbd6246049677ecdefb16b837" lucid_version="MB002000JWFVN_MB004000JWFVP_ESXi@HPD3(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="539ed4e104fc49caac711d8c4da1d36a" version="29037d244708467ba7fc7a4c7a71fdd6" lucid_version="VK000240GWCFD_VK000480GWCFE_VK000960GWCFF_x64@HPG3(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="87793aff72a54849a327ce026784372d" version="125af99799fb48db8f70422ef44fa0f2" lucid_version="e1r.w2k19@12.18.11.1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.18.11.1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.18.9.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>

<p>This product add Wrapping and fix Support To Cometlake,and added thermal sensor support for fiber NIC.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which override and copy constructor to MSIX_AFFINITY_MANAGEMENT class to eliminate KW issues with double freeing memory.<br />
This product correct an issue which fixed e1r compile to exclude Nahum Icelake defines.<br />
This product correct an issue which fixed conversion of timestamp into 64bit value.<br />
This product correct an issue which fix for NDIS Miniport Kernel Pointer Leakage</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6b5a27285d114b399ac0db53bb209710" version="aa3d4406089f4e5187d48f412bb46bab" lucid_version="VO0480JFDGT_VO0960JFDGU_VO1920JFDGV_ESXi@HPD9(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1e5bf302dfcf48eb8cdaa03a5c140f4d" version="9e38448dcc1345188b95e240d1dad709" lucid_version="StorCLI.linux@007.1616.0000.0000__pubsw-linux_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="007.1616.0000.0000" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This version of StorCLI supports maintaining, troubleshooting, and configuration functions for the MegaRAID&reg; Gen10+ controller products: MR416i-a,&nbsp;MR416i-p,&nbsp;MR216i-a,&nbsp;MR216i-p</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.25.12" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for the Apollo 4510 system</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6d1e58e8f89340958bf7818046e9b7c7" version="7f3bfdf771f04b0cb90078507a9e361c" lucid_version="mlnxcx4.w2k19@2.60.23957.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.60.23957.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses a Windows Stop Error (BSOD) seen when running Mellanox NdStat Utility (mlx5cmd -ndstat) while ND connections was closing.</li>
	<li>This product corrects driver loading failures seen due to incorrect INF file.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40.22511.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ol>
	<li>The number of VMs is limited to 124 VMs with VMQ(Virtual Machine Queue) mode.</li>
	<li>The driver supports up to 200 vPorts in ConnectX-4 Lx and 254 vPorts in ConnectX-5 with SRIOV(Single Root I/O Virtualization).</li>
</ol>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ol>
	<li>This product correct an issue which caused memory corruption in case the OS provided continues memory across multiple pages that did not start with offset zero on aligned memory address.</li>
	<li>This product correct an issue that prevented the device from being updated with the new driver because the driver was already in the driver store.</li>
	<li>This product correct an issue which occasionally prevented the VF counters from being displayed correctly in perfmon.</li>
	<li>This product correct an issue which caused the driver to report zero link speeds supported when working with firmware older than 1x.18.0240.</li>
	<li>This product correct an issue which fixed a memory leak issue in error flow during driver initialization.</li>
</ol>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8cec45e9870e4e5fad3d7d2b3b545e8d" version="3555fcf212c94841b362d82dc76d07fb" lucid_version="bnxtnet.vmware67@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which Purple Screen Of Death (PSOD) while running &nbsp;Virtual SAN (vSAN) over &nbsp;Remote Direct Memory Access (RDMA) traffic due to invalid Completion Queue Element (CQEs)</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.14" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue where RDMA Ethernet Controller error description on ESXi Host.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="14ccfdf7a8d64255bce75290d1e21746" version="299f3ac601a4460d9602ffd6fac4d9d8" lucid_version="be2iscsi.w2k19@12.0.1171.0(C)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1171.0" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="text-align:left">This product now supports the following network adapters:</p>

<ul style="list-style-type:square">
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1171.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1d54c8dcf99741aabe78b8a4e54d84f8" version="4f1e07ee21c24ee7a1ac76cc9e675edd" lucid_version="MB014000JWRTH_MB012000JWRTF_MB010000JWRTE_x64@HPD2(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e8a7c3696813408f916249b859b6b722" version="ecb8ee670295494cb722ea656f653406" lucid_version="MM1000GFJTE_x64@HPG5(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="47f79ff4032545a7bdbbbdab76c5b9b2" version="d975e0a231f5496c80ea72988a8242ca" lucid_version="be2net.rhel7.x86_64@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7 Update 8 and&nbsp;Red Hat Enterprise Linux 7 Update 9.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1280.17-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="38437d438933420e8063d6e963ffd91f" version="72c7c8eb16f24655bcf3be7b1a2a977e" lucid_version="MM1000GEFQV_MM2000GEFRA_x64@HPG8(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a162b7594d8d4a02bf2f3f7d9fe2609d" version="76dd221b4c0d4ed3b0a4ebdd25e5fc48" lucid_version="igb.sles15@6.2.5-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="6.2.5-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now support HPE Intel Online Firmware Upgrade Utility for Linux x86_64, version (or later) to update firmware</li>
	<li>This product now supports Suse Linux Enterprise Server 15 Service Pack 2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.2.3-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="591f92a69b8e4f239251cc96e1b31290" version="8ff6481f2f5e4e97804bc6514d03a4ab" lucid_version="NVMe_Backplane_PIC.linux@8.4(D)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="8.4" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SUSE Linux Enterprise Server 15 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.4 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated to support Service Pack for ProLiant version 2017.07.0</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<strong>Note:</strong> If&nbsp;version 8.4 was previously installed, then it is not necessary to upgrade to version 8.4 (C).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d952c2a30d6f4bb29ccf7ec141400337" version="c00af0d9c31341d298ad4120812fbc8a" lucid_version="smartpqi.rhel8_x86_64.rpm@2.1.8-040__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.1.8-040" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>-</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>-</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.16-040" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>To add&nbsp;an enhancement to fix the stale Drive fi&nbsp;rm&nbsp;ware version returned by a Power Shell command.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">This release provides the following fixes:&nbsp;</p>

<ul style="list-style-type:disc; margin-left:0px; margin-right:0px">
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the system hangs when resuming from hibernation.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue&nbsp;where the enclosure identifier field corresponding to the physical devices became empty in&nbsp;lsscsi/sysfs&nbsp;during device rescan.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue to display topology using PHY numbers&nbsp;</p>
	</li>
</ul>

<ul style="list-style-type:disc; margin-left:0px; margin-right:0px">
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the driver did not export valid SAS&nbsp;initiator_port_protocols&nbsp;and&nbsp;target_port_protocols&nbsp;to&nbsp;sysfs.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the driver would cause a kernel panic if it got an invalid response from the controller.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the LUN reset, system shutdown, system suspend, system hibernate, controller offline, and I/O requests could reach the controller when they are not required.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where after modifying the logical volume size,&nbsp;lsblk&nbsp;command still shows up previous size of logical volume.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where during the device discovery, the driver issued an INQUIRY to physical devices, and these requests could get lost due to broken devices, loss of signal issues, etc. This would cause device discovery to get hung.&nbsp;</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="130da7feaa1d444b8b70a759892883b1" version="58748ca220fa40e58bc0bdba72e5a867" lucid_version="nvmenmifix.gen10.win@1.1.0.0(C)-rev2__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.1.0.0" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019</li>
	<li>Added support for the HPE ProLiant XL270d Gen10 and the HPE ProLiant XL420 Gen10</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.1.0.0 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Windows Server 2019.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="67cd5bd58926486d97948e2f92725c2f" version="c8c30aaf491f47ab82361327e2d3c78e" lucid_version="matrox.G200eH3.win2012.x64@9.15.1.224(B)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="9.15.1.224" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Add support for iLO 5 version 2.x firmware.
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.15.1.224" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for random screen corruption when changing resolution that could occur with driver versions 9.15.1.184 and 9.15.1.218.</li>
	<li>Fix for a display freeze that could occur when running the Windows Display Diagnostics tool (dispdiag.exe).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8580226958cf4ea0a4c511ccdfa9e081" version="2062eb0e8cbd4f7c9d5317075deb73d5" lucid_version="vxn.w2k16@2.1.192.0(B)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.1.192.0" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">This product now&nbsp; supports the following the network adapters:</p>

<ul style="list-style-type:square">
	<li>HPE Ethernet 10Gb 2-port 561FLR-T Adapter</li>
	<li>HPE Ethernet 10Gb 2-port 561T Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.1.192.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="01e0939311154208bbd5b8d9e5157a9c" version="75651141a48843bea4537056071992e6" lucid_version="ssacli.win_x64@5.10.44.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="5.10.44.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Adding support to the HPE SR Gen10 Plus Controllers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="189399e2f82a48ee85c54d779b410263" version="f976d4260542472c86ccf6b4e013f6fd" lucid_version="EK0800JVYPN_EO1600JVYPP_MK0800JVYPQ_MO1600JVYP_x64@HPD7(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us</a>.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (B)" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us</a>.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1b944a04f5844e8cab35edaa8a7e8e54" version="00648c3c2a5d4ab59551b9fbae5baf38" lucid_version="lpfc.driver.esxi65.zip_bl@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.8.317.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.6.182.2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>One port of an Fibre Channel adapter could not complete to reconnect to storage after storage upgrade if the host system had been online for over 3 months</li>
	<li>Turning on 3PAR Persistent Checksum after the host operating system was running would not result in Persistent Checksum being enabled between the adapter and 3PAR array.</li>
	<li>Virtual Machines (VMs) could not access certain storage arrays when those arrays were attached to the VM using N-Port ID Virtualization (NPIV)</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d348cc79cad0401481d553a1970ba39e" version="50f027b03ab249ef9a76185694d24e43" lucid_version="lsi-mr3.esxi6.7_bundle@2019.12.13__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2019.12.13" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Addressed a vSAN Fault Tolerance test failure seen in JBOD mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2018.02.12" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added VMware vSphere 6.7 OS support</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="57c8ff295b854dbeaea4e204fed3ef83" version="e1f76f75c3eb4c3686fe0db805a0f534" lucid_version="EG000300JWBHR_x64@HPD4(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d1b3d5a922ad44aab83b4058affcf027" version="d4fecb6ed31c479a92efb8940576786e" lucid_version="ql_iscsiuio.sles15sp1@2.11.5.13-3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.11.5.13-3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5049ff108a414cae906f3f80d242a819" version="f7db2aa288e645bf974ed0c5455328b2" lucid_version="igb.sles12.x86_64@6.2.5-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="6.2.5-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now support HPE Intel Online Firmware Upgrade Utility for Linux x86_64, version (or later) to update firmware</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.2.3-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="634c75df063f418e8a220d306623aa90" version="eebc6dba482942fab422c7e1d787cd5d" lucid_version="hpqams.win.x64@10.99.0.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.99.0.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added Logical Drive Trap&nbsp;5023.</li>
	<li>Changed IDE/SATA interval time from 120 seconds to 60 seconds.</li>
	<li>Redirect more iLO security logs to the Windows event system.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed IML missing NIC link down record if the user unplugs many cables at the same time.</li>
	<li>Fixed iLO web GUI missing IPv6 address when Windows Hype-V switch is created.</li>
	<li>Fixed a crash issue when AMS is querying iSCSI information.</li>
	<li>Fixed incorrect drive status if IDE SATA drive is busy on access.</li>
	<li>Fixed incorrect drive status if Windows see&nbsp;the predictive failure drive.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.97.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed the unexpected SNMP Trap 11020 being generated even if there is no change in health status. The issue was caused by SNMP cpqHoMibHealthStatusArray OID value being OK (2)&nbsp;even if the corresponding hardware is not present. The default condition has been changed to Unknown (0).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fbe68804b30c4fe28e13ea472cae5392" version="3536f51b94174d6e9930653ae72c79e2" lucid_version="MB008000GWWQU_MB006000GWWQT_ESXi@HPG2(C)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9225c9596a464443833dcfea70680689" version="1654d15cf3794a0da4d353bbf31cb3a5" lucid_version="smartpqi.sles12.x86_64.rpm@2.1.8-040__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.1.8-040" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>-</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.16-040" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">To add an enhancement to fix the stale Drive fi&nbsp;rm&nbsp;ware version returned by a Power Shell command.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">This release provides the following fixes:&nbsp;</p>

<ul style="list-style-type:disc; margin-left:0px; margin-right:0px">
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the system hangs when resuming from hibernation.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue&nbsp;where the enclosure identifier field corresponding to the physical devices became empty in&nbsp;lsscsi/sysfs&nbsp;during device rescan.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue to display topology using PHY numbers&nbsp;</p>
	</li>
</ul>

<ul style="list-style-type:disc; margin-left:0px; margin-right:0px">
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the driver did not export valid SAS&nbsp;initiator_port_protocols&nbsp;and&nbsp;target_port_protocols&nbsp;to&nbsp;sysfs.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the driver would cause a kernel panic if it got an invalid response from the controller.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the LUN reset, system shutdown, system suspend, system hibernate, controller offline, and I/O requests could reach the controller when they are not required.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where after modifying the logical volume size,&nbsp;lsblk&nbsp;command still shows up previous size of logical volume.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where during the device discovery, the driver issued an INQUIRY to physical devices, and these requests could get lost due to broken devices, loss of signal issues, etc. This would cause device discovery to get hung.&nbsp;</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c54f04999d6b49af842950ebb0be7aac" version="cefbb324378a48a49f2337e06ec3b0cf" lucid_version="qla2xxx.rhel7.x86_64_legacy@10.02.01.00.a14-k1__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.01.00.a14-k1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 10.02.01.00.a14-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.01.00.64.07.6-k1a (b)" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;driver version&nbsp;to 10.01.00.64.07.6-k1a</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ol>
	<li>Multipath&nbsp;message appears with storage port reset, node reboot and panic</li>
	<li>Port login&nbsp;does not complete&nbsp;with storage port reset activity</li>
	<li>Multipath command does not respond</li>
	<li>Fix SCSI error-handling when I/O completes after an abort completion which may cause system to terminate unexpectedly</li>
	<li>Please refer advisory at <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us</a></li>
</ol>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="421cc08cc7bc4143866089180c719d3f" version="6471977c9a6a40999b5407e11fd0d7aa" lucid_version="MB012000JWDFD_x64@HPD2(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="68a7de4833704c8fb3dbc75f2b162b30" version="55bfe42d61be4ff9bf45287ae39cabf4" lucid_version="EH0600JDYTN_x64@HPD7(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a data integrity risk where stale data is mistakenly used from cache.</li>
	<li>Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.</li>
	<li>Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (D)" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a data integrity risk where stale data is mistakenly used from cache.</li>
	<li>Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.</li>
	<li>Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read. </li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e3b32b83ce544644bc4408de465e0c11" version="32b6aca4a6ce47e9b8effff556a7ce0f" lucid_version="EG0300FCSPH_EG0450FCSPK_EG0600FCSPL_EG0900FCSP_x64@HPD2(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c5274a8d3e3e40d790c226da85bd84aa" version="e1ae5aaa79814754900e177669078eb8" lucid_version="VK000240GWTSV_VK000480GWTTA_VK000960GWTTB_ESXi@HPG6(B)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for ESXi 7.0 U1.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>HPG6 introduces bug fixes, reliability enhancement and modification in SMART Attributes. Once HPG6 is downloaded, the drive cannot be changed back to an earlier firmware (eg, HPG3).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="38d33d1fd49e4ce68d34a95d7c8c3f1f" version="f0031a55060a411fbf9333210e77eaa0" lucid_version="VO000480JWDAR_VO000960JWDAT_VO001920JWDAU_x64@HPD8(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (B)" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0b1755ac9ea74055988f525407cd9d18" version="d55720a0a7e04e859b2c681399c3f7a9" lucid_version="nicfwupg_qlnx2_bl.linux_x64@1.2.3__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.2.3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7, Updates 8 and 9.<br />
This product now supports Red Hat Enterprise Linux 8, Updates 2&nbsp;and 3.<br />
This product now supports SUSE Linux Enterprise Server 12 SP5.<br />
This product now supports SUSE Linux Enterprise Server 15 SP2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where powering on the system with any I/O virtualization functionality (NPAR, SR-IOV, etc) enabled results in an Uncorrectable Machine Check Exception (UMCE).<br />
This product addresses an issue where the WOL option is displayed on the Human Interface Infrastructure (HII) menu for 534M and 630M mezzanine devices, even though WOL is not supported on those devices.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.9" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>

<p>&nbsp;</p>

<p>This product now supports the following operatings systems:</p>

<ul>
	<li>Red Hat Enterprise Linux 7 Update 7</li>
	<li>Red Hat Enterprise Linux 8 Update 0</li>
	<li>SUSE Linux Enterprise Server 15 SP1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an&nbsp;incorrect local sequence number in the Link Layer Discovery Protocol (LLDP).</p>

<p>This product addresses an issue where boot mode is not&nbsp;restored to the default value after a factory reset.</p>

<p>This product addresses an issue where the F1 help messages&nbsp;&quot;Number of VFs per PF&quot; and &quot;Legacy Boot Protocol&quot; option display incorrectly in Japanese and Simplified Chinese languages.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3e563464a2c34e22b29e876df5230ef9" version="75133a9e4b2748378f5e31021304878f" lucid_version="hp-snmp-agents_sles12_x86-64@10.9.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="10.9.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed issue where the HPE Synergy 3820C 10/20Gb Converged Network Adapter was showing not supported</li>
	<li>Corrected invalid utf8mb4 char in database</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.9.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>&nbsp;the hp-snmp-agents service version 10.9.0 on an HPE ProLiant Gen9 Server or an HPE Synergy Gen9 Compute Node may experience a segfault after installation or restart of the hp-snmp-agents service. cmahostd or cmapeerd process will be killed after the segfault.&nbsp; Pleaer review customer advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00098957en_us" style="color:#0563c1; text-decoration:underline">a00098957en_us</a>&nbsp;for additional details.</li>
	<li>The OS version reported by hp-snmp-agents reported a&nbsp;mismatch with the newer Linux OS distros. i.e., &quot;SUSE Linux Enterprise Server 12&quot; v.s &quot;SUSE Linux Enterprise Server 12 SP5&quot;&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e79fad26938d4b788f99ac1b9d5aa529" version="f26e96faa1354fc5b9bf5fb0ed0c21b0" lucid_version="Apollo_2000_Gen10Plus.Win@1.27__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.27" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>support added for Gen10Plus servers</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1a455792d85d4dea8d7373fc92fb5b20" version="648f0b90d7c2438b82851940e28f4419" lucid_version="nicfwupg_bcm.vmware@1.28.6__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.28.6" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product addresses an issue about lack of information under AHS log.</li>
	<li>This product addresses an RSOD issue which appeared intermittently during POST after having a warm reboot.</li>
	<li>This product addresses a modification on help string of Family Firmware Version.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.27.5" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects the wrong spare number while it was originally not the same as what was written on the label of package.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="349d4407749e4a9fa71df176f3e03e78" version="c5df58d0669a49d081f5c556a573b91e" lucid_version="VK000240GWEZB_VK000480GWEZC_VK000960GWEZD_VK00_x64@HPGE(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGE" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGE (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix to issue in bootloader download during power loss. &nbsp;</li>
	<li>Change IDF Word 106 report 4K TU for 4/8TB drives to align with Microsoft SQL requirement.</li>
	<li>Improvements to error exception.</li>
	<li>Improvements to Secure lock fix during multi-thread read tests with high freq. power cycling.</li>
	<li>HPGE includes a fix to improve the ability of the drive firmware to find and repair errors on the drive.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eeaaff922a754e178b46a3315fd0a64a" version="bed764d3079941028e604378e290a79b" lucid_version="nicfwupg_intel_open.linux_x64@1.22.11__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.22.11" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports SUSE Linux Enterprise Server 15 SP2.</li>
	<li>This product now supports Red Hat Enterprise Linux 8, Update 2 and Update 3.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.21.5" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>Intel X710-DA2 Ethernet 10Gb 2-port SFP+ OCP3 Adapter for HPE</li>
	<li>Intel X710-DA2 Ethernet 10Gb 2-port SFP+ Adapter for HPE&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2d95bd349a5f487bbf7bbf3c783e4857" version="2518ca8f7bf64c0180e2fcefe647aa86" lucid_version="be2net_bl.rhel7@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7, Updates 8 and 9.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1341.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7 Update 8 and Red Hat Enterprise Linux 7 Update 9.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b7238ec8b07746d28a0d044f81b28100" version="fbe0f034e17d46b591b978c2e2152021" lucid_version="PICGen9.linux@1.0.9(J)-rev1__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.9" revision="J" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.9(J) contains updates to the component packaging and is functionally equivalent to ver. 1.0.9. It is not necessary to upgrade with Revision J if a previous component Revision was used to upgrade the firmware to version 1.0.9.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addresses an issue in which the minimum power capping value was incorrectly being calculated on certain systems. This fix increases the accuracy of the minimum capping value set during POST.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.9 (J)" revision="J" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.9(J) contains updates to the component packaging and is functionally equivalent to ver. 1.0.9. It is not necessary to upgrade with Revision J if a previous component Revision was used to upgrade the firmware to version 1.0.9.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addresses an issue in which the minimum power capping value was incorrectly being calculated on certain systems. This fix increases the accuracy of the minimum capping value set during POST.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4a40e009928d473f96b4a66d5f8ed116" version="ea29e2bfee6c4169a1dd36593554df18" lucid_version="hp-health_rhel7_x86-64@10.9.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="10.9.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>TBD</li>
	<li>TBD</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.9.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Modified the loop initial values in hpasmcli from 2 to 0.</li>
	<li>Modifications to check the read and write variables to match RBSU in Legacy and UEFI mode</li>
	<li>Updated the hpasmcli check string to correctly report the impitool information.</li>
	<li>Remove the redundant serial embedded and com ports</li>
	<li>Addressed&nbsp;IML message size limitation from 36 to 212 bytes</li>
	<li>Support for hp-health in OS security boot</li>
	<li>Added supporting &ldquo;quote mark&rdquo; in SET NAME command</li>
	<li>Enabled to set PXE as boot first&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c19eee3c7a1046a4aeaff35e462fce56" version="fc8388bdca8b4c7dafd1c7c5d9a972c9" lucid_version="MM1000GEFQV_MM2000GEFRA_ESXi@HPG8(G)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="37828e7bce5241f6a19b4fa05756658e" version="ac7579ec4a4f4ace9ba3a965a7e6d30d" lucid_version="P99.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled (TXT is disabled by default). This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6388aca0e9384416957e1de0a3b220b2" version="1cd2d1f20c5446e8b6d9365558dd6eb7" lucid_version="brcmnvmefc.driver.esxi70.zip_rt@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.8.329.0</p>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5525dd3ac4024adeb1f8ec72b9fd1236" version="fbef3cf35c0e4084b972592ff37286b2" lucid_version="EG001800JWJNL_EG002400JWJNN_x64@HPD2(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="05aa24e5db0c41fc91f79deb60685a31" version="858d3a672ac64df2ba1f62ee19b6afb6" lucid_version="MM1000JFJTH_x64@HPD3(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="506d73f1a1f34beeb329c1ead8b7d250" version="bf4ca757b81c4223b9a3724013c57191" lucid_version="Shenandoah_sas.sles15.x86_64.rpm@07.716.02.00-rev2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="07.716.02.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="07.716.02.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial build</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8be880867f274999951d42eb0e3b0aa8" version="c2b714347dc14d0c88239e450fdfdb10" lucid_version="qlogic_linux_smartsan_enablement@3.3-3(h)-rev1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.3-3" revision="h" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added Support to RHEL8 and SLES15SP1</p>

<p>Updated to version 3.3-3</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.3-3 (h)" revision="h" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added Support to RHEL8 and SLES15SP1</p>

<p>Updated to version 3.3-3</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="74bcebdbd1974e4b8af3429e65c84801" version="9376aceb3c804725865993f4fa69ead0" lucid_version="qla2xxx.driver.esxi65.zip_bl@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 2.1.101.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0789ba677e9748e99f7b62253abbd63d" version="6725749b27bb4bacbccf254f52cb761b" lucid_version="HP-CNA-FC-Broadcom-Enablement.rhel8.x86_64@12.0.1339.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1339.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version: 12.0.1339.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1264.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version: 12.0.1264.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cd4b5a9c9ed9405abbc5be7a9f037870" version="5ed6addf110a4d4a92681fad0edc66ca" lucid_version="amsd_sles15@2.4.1-rev1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.4.1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This release contains the following enhancements:</p>

<ul>
	<li>Enhance the robust communication with iLO. The enhancement has a proper process exist and OS signal handling.</li>
	<li>Enhance the SMA logging system for better recording of the communication events.</li>
	<li>The AMSD reports the Open NIC controllers SN to align with iLO for avoiding the un-sync information.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed a small amount of memory leak as outlined in the Customer Advisory,&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00053824en_us">a00053824en_us</a></li>
	<li>A customer may experience where smad may periodically report: No response from iLO for Hello.&nbsp; After losing connection with iLO, the subagent may experience&nbsp;high CPU utilization for trying the reconnection. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us</a>.&nbsp;</li>
	<li>The cpqIde service not able to start while the AMSD configuration is agent mode.</li>
	<li>Addressed&nbsp;buffer overflow issues in select&nbsp;corner cases.</li>
	<li>Metadata update to address new AMD servers not listed in the supported platforms list.&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.4.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This release contains the following enhancements:</p>

<ul>
	<li>Enhance the robust communication with iLO. The enhancement has a proper process exist and OS signal handling.</li>
	<li>Enhance the SMA logging system for better recording of the communication events.</li>
	<li>The AMSD reports the Open NIC controllers SN to align with iLO for avoiding the un-sync information.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed a small amount of memory leak as outlined in the Customer Advisory,&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00053824en_us">a00053824en_us</a></li>
	<li>A customer may experience where smad may periodically report: No response from iLO for Hello.&nbsp; After losing connection with iLO, the subagent may experience&nbsp;high CPU utilization for trying the reconnection. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us</a>.&nbsp;</li>
	<li>The cpqIde service not able to start while the AMSD configuration is agent mode.</li>
	<li>Addressed&nbsp;buffer overflow issues in select&nbsp;corner cases.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="61d3db3934a9409ea2efff88ec08bbc6" version="cab99dcef31246e79bbcb163a81e1b59" lucid_version="be2iscsi_bl.sles12@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 12 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>These drivers have been&nbsp;updated to maintain compatibility with the latest firmware.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="35cb34a457a347fd86df4f560cf6cf57" version="e57b12ec49094f8a9d37a652d98a550a" lucid_version="MLNX_Ethernet_Only_NIC_MFT_FW_package.x64@1.0.4-rev1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device is&nbsp;updated to 14.29.1016:</strong></p>

<p>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</p>

<p><strong>Following New features and Changes are included in version 14.29.1016:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in version 14.29.1016:</strong></p>

<ul>
	<li>An issue that caused the sent packet to hang while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>A rare case where the the device froze&nbsp;while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance while using the VSC to trigger the send_ring_doorbells.</li>
	<li>An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.</li>
	<li>An issue that caused the fragmented IP packets to drop was fixed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device is&nbsp;updated to 14.28.1002:</strong></p>

<p>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</p>

<p><strong>Following New features and Changes are included in version 14.28.1002:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in version 14.29.1016:</strong></p>

<ul>
	<li>An issue that caused the sent packet to hang while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>A rare case where the the device froze&nbsp;while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance while using the VSC to trigger the send_ring_doorbells.</li>
	<li>An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.</li>
	<li>An issue that caused the fragmented IP packets to drop was fixed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7481c4f359924b82adf02da5a315552d" version="915814ba3e3c4667b44af6191061b825" lucid_version="hp-smh-templates_noarch@10.8.1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="10.8.1" revision="" type_of_change=""/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.8.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial support for&nbsp;SUSE LINUX Enterprise Server 15.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="118ba074c4b3495fbd26210e14a17511" version="372736fca6d2453c860cd03ce139f4a9" lucid_version="U40.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6d91322ca9b048648de88ccf34f795c6" version="a12b1ac5a11042a1a70089b0c696429a" lucid_version="Express_Bay.ESXi@1.78(B)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.78" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added VMware vSphere 6.7 OS support</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.78" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Corrected the&nbsp;temperature status of Seagate NVMe hard drives.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eb66fafd28ff4c39a42b91395104bd05" version="37612bf05574410e82a1d995f4c5da94" lucid_version="qla2xxx.sles15.x86_64@10.02.01.00.a14-k1__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.01.00.a14-k1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 10.02.01.00.a14-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.01.00.64.15.2-k1b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Driver&nbsp;of SuSE Linux Entherprise Server 15 Service Pack&nbsp;2 version 10.01.00.64.15.2-k1b</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e408d6e3ab3141509209d893c046e5e7" version="63f19969a25e4c5b99e007aa57f4599f" lucid_version="emulex.cna.fw.lin.x64_bl@2021.02.01-rev2__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp;have separate components to update fibre channel and converged network adapters.&nbsp; This is a converged network adapter update component.<br />
<br />
Updated CNA (XE100 series) firmware&nbsp;</p>

<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650FLB Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650M Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p dir="LTR">Fixed the following:</p>

<ul>
	<li>Fixed a behavior with internal engineering data displays</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2021.02.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp;have separate components to update fibre channel and converged network adapters.&nbsp; This is a converged network adapter update component.<br />
<br />
Updated CNA (XE100 series) firmware&nbsp;</p>

<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650FLB Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650M Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="89d9be7c134e4e5d9700073722a0ffab" version="14c85f7ab1b349818d323a06cf70f9c8" lucid_version="emulex.fc.fw.esxi65_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1" dir="LTR" style="width:935px">
	<tbody>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 81E 8Gb Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 82E 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 84E 8Gb Quad Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1000E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1000E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E Quad Port 16Gb Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp; have separate components to update fibre channel and converged network adapters.&nbsp;This is a fibre channel&nbsp;update component.</p>

<p><strong>Contains:</strong></p>

<p>32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>16/32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>16 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>8 Gb HBA Standup firmware 2.10X6<br />
8 Gb standup universal boot image 12.60a4(12.6.302.0 BIOS, 12.6.284.0 UEFI)</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5fcadb289d2a4581aa347222e1e2d7d1" version="80a5a3c49744434ead633b3163150833" lucid_version="nicfwpkg_bcme_open@218.0.166.0__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="218.0.166.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial version</li>
	<li>This product brings the support of Data Center Interconnect on supported devices.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses a modification on help string of Family Firmware Version.</li>
	<li>This product addresses an issue about failing to detect firmware version while updating that under operation system.</li>
	<li>This product addresses an issue about connection lost under pre-OS environment after restart the system from OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="273329c7dcda48fbb886f52e82f63064" version="1f9a78a521804f5081b7834970c35cd9" lucid_version="be2iscsi.w2k12r2@12.0.1171.0(C)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1171.0" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="text-align:left">This product now supports the following network adapters:</p>

<ul style="list-style-type:square">
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1171.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f651d51d32bf48dca96b23a2b4fb67f4" version="7132662dcbc44b749ff8f1dff0da7b60" lucid_version="EG001800JWFVC_ESXi@HPD3(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="baaff1c67f3f496a9b2cb59a73843db0" version="e09e6de6ed4946ebb3c232cfddf903a4" lucid_version="Gen10Plus_UBM2_Backplane_PIC@1.16__sc-linux-fw-array_en"/>
      <revision_history>
        <revision>
          <version value="1.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial release</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a6b537d158284bcb8d8b5bf0c949d656" version="a34871f8c7de4bd7a987625a898740ef" lucid_version="Gen10Plus_UBM4_Backplane_PIC@1.20__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="459b31cbafbe408eaf0a96421248c984" version="87d7e834163f44059d0fbb819c4021bb" lucid_version="MZXL5800HBHQ-000_MZXL51T6HBJR-000_MZXL53T2_x64@3H5Q(B)-rev1__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="3H5Q" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">*REMOVED* - Version 3H5Q(B) is NO LONGER AVAILABLE for download. Working version MPK73H5Q supporting full firmware version is now available from the following OS-specific URLs:</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">VMware: MPK73H5Q Firmware For VMware Operating Systems, https://www.hpe.com/global/swpublishing/MTX-bc5a85e2da894acc87edff7b07</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Windows: MPK73H5Q Firmware for Windows Operating Systems, https://www.hpe.com/global/swpublishing/MTX-eb2b1b0ee298477fb52d02948f</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Linux: MPK73H5Q Firmware for Linux Operating Systems, https://www.hpe.com/global/swpublishing/MTX-c2d518c8671942018d4084aa37</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Version MPK73H5Q will be available soon in Service Pack for ProLiant. For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us. This Smart Component provides firmware for the following drive models: MZXL5800HBHQ-000, MZXL51T6HBJR-000, MZXL53T2HBLS-000, MZXL56T4HALA-000, MZXL512THALA-000, MZXL5960HBHQ-000, MZXL51T9HBJR-000, MZXL53T8HBLS-000, MZXL57T6HALA-000 and MZXL515THALA-000</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Working version MPK73H5Q resolves the following issue:</p>

<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3H5Q (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting .</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8fa907efc8b04d69b552ce8d557c6113" version="d99af2893f80438a8fa7d07a5ec6d2c8" lucid_version="MB2000JFEPA_MB4000JFEPB_x64@HPD5(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b6b93bd958d94fa882426d0e7804a97a" version="1556330b16d84d5b9b2ca0146ae38ea9" lucid_version="Apollo_2000_Gen10.Win@1.00(B)-rev1__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.00" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.00 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ecd80496db274bbda7c43a5153ea6bdf" version="1ea77270381842cf9afaf553085e2b85" lucid_version="Apollo_4200_Gen10.win@1.78(A)__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.78" revision="A" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added HPE Smart Array P824i-p controller&nbsp;support</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.78" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for the HPE Apollo 4200 Gen10 Server</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4ec88340a2ce4a0da239c4051a775bd6" version="999c3f7705f243f59baf7e0c41c0f3bb" lucid_version="VK000240GWTSV_VK000480GWTTA_VK000960GWTTB_x64@HPG6(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>HPG6 introduces bug fixes, reliability enhancement and modification in SMART Attributes. Once HPG6 is downloaded, the drive cannot be changed back to an earlier firmware (eg, HPG3).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="da2886f50e85443fa3f87dcf733edc2b" version="74cd88bdfbf54bf5bd8c1cc53129ec38" lucid_version="be2iscsi.rhel8@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 8 Update 2 and&nbsp;Red Hat Enterprise Linux 8 Update 3</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9c1bf13a249f407385b64aced1372b42" version="bce85f0f5df0438bb89ca0809299c4fe" lucid_version="ql_iscsiuio_bl.sles12sp4@2.11.5.13-3(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.11.5.13-3" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product has&nbsp;been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.11.5.13-3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an&nbsp;iSCSI BFS failure with VLAN.</p>

<p>This product addresses an&nbsp;iSCSI discovery failure with VLAN.</p>

<p>This product addresses an issue where&nbsp;an iSCSI portal is&nbsp;discovered with invalid an VLAN ID.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5a5d111ea5d342d3a23a115f7e130493" version="13fcd40ea16344a7a369dc9c62b78116" lucid_version="wmiproviders.win.x64@11.0.0.0-rev2__sc-windows_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="11.0.0.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed issue that allowed installation on unsupported products incorrectly</li>
	<li>Modified help information to comply with de-branding requirements</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="11.0.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Server provider
	<ul>
		<li>Fixed product dependency issue</li>
		<li>Rebrand help information</li>
	</ul>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="65d759aa54bf415a9a190ccfb152d004" version="3097b762d1404df3a7b0dc2d238f94fd" lucid_version="I41.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8e8fd25144334177930f2db95d492320" version="0e32155de80a4c609ea573f45309a87f" lucid_version="VK000480GWTHA_VK000960GWTHB_VK001920GWTHC_x64@HPG2__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This maintenance FW release addresses a rare corner case COMRESET issue at warm boot, and to address an early EOL behavior under certain use cases.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="74b89b05406c4068843f3b27148a33d9" version="0860ece1489c420c911b9ff24878b641" lucid_version="MO0400KEFHN_MO0800KEFHP_MO1600KEFHQ_x64@HPK4(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SLES15SP1.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8d193d8d218443f6b0fa9476dd4e1562" version="bb7e74123df640a0a8d37e579daf5ada" lucid_version="lsi_sas2.w2016.x64@2.68.64.2(C)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="2.68.64.2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Improved integration with Smart Update Manager</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.68.64.2 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:.1in"><strong>Change implemented in version 2.68.64.2(B)</strong>:</p>

<ul>
	<li>Updated to support Service Pack for ProLiant version 2017.07.0.<br />
	<strong>Note:</strong> If component version 2.68.64.2(A) was previously installed, then it is not necessary to upgrade to version 2.68.64.2(B).</li>
</ul>

<p style="margin-left:.1in"><strong>Enhancements/New Features implemented in version 2.68.64.2(A)</strong>:</p>

<p style="margin-left:.2in">Added support for:</p>

<ul>
	<li>Microsoft Windows Server 2016 - Server Core and Server with a Desktop.</li>
	<li>Revised component package. No change to driver functionality resulting from the change. If system has previously updated to driver version 2.68.64.2, then it is not necessary to update to 2.68.64.2(A).</li>
</ul>

<p style="margin-left:1.0in">&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c91a34b258694c1696514c7b51041b33" version="f8efeb05689044f18bf17bae724720cd" lucid_version="a48.fwpkg@2.40_02-24-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-24-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support for AMD EPYC 7003 processors.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.<p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ddc8bdca3abc4ab8823e820be1ed4dfd" version="420f1982e4764656a700ea3065dd47b8" lucid_version="smartpqi.sles15.x86_64.rpm@2.1.8-040__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.1.8-040" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>-</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.16-040" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>To add an enhancement to fix the stale Drive fi&nbsp;rm&nbsp;ware version returned by a Power Shell command.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">This release provides the following fixes:&nbsp;</p>

<ul style="list-style-type:disc; margin-left:0px; margin-right:0px">
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the system hangs when resuming from hibernation.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue&nbsp;where the enclosure identifier field corresponding to the physical devices became empty in&nbsp;lsscsi/sysfs&nbsp;during device rescan.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue to display topology using PHY numbers&nbsp;</p>
	</li>
</ul>

<ul style="list-style-type:disc; margin-left:0px; margin-right:0px">
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the driver did not export valid SAS&nbsp;initiator_port_protocols&nbsp;and&nbsp;target_port_protocols&nbsp;to&nbsp;sysfs.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the driver would cause a kernel panic if it got an invalid response from the controller.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where the LUN reset, system shutdown, system suspend, system hibernate, controller offline, and I/O requests could reach the controller when they are not required.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where after modifying the logical volume size,&nbsp;lsblk&nbsp;command still shows up previous size of logical volume.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue where during the device discovery, the driver issued an INQUIRY to physical devices, and these requests could get lost due to broken devices, loss of signal issues, etc. This would cause device discovery to get hung.&nbsp;</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4f319faf890642fc80a3d8719760c121" version="65c6754b2f33461bacd59f7bfa851024" lucid_version="P408i-p_P408e-p_P408i-a_P408i-c_E208i-p.ESXi@3.53-rev1__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="3.53" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added UBM type3 backplane support</li>
	<li>Added support for long device model/product ID for SATA drives.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li style="list-style-type: disc;">An issue where the controller might become unresponsive while receiving periodic I/Os.</li>
	<li style="list-style-type: disc;">Host I/O timeouts might occur due to continuing firmware attempts to discover devices during an expander configuration.</li>
	<li style="list-style-type: disc;">A controller lockup problem (with code 0x1E10) might occur when a bad drive with unsupported block size.</li>
	<li style="list-style-type: disc;">A Controller hangs when multiple hot-plug and hot remove events (drives or JBODs) were being processed.</li>
	<li style="list-style-type: disc;">A Controller hangs on Flash Backed Write Cache enabled logical drives with sequential read towards the end of the logical drive.</li>
	<li style="list-style-type: disc;">A Controller hangs when hot-plug physical drive with outstanding I/Os.</li>
	<li style="list-style-type: disc;">A controller hangs if a host I/O and background consistency check simultaneously encounter a RAID-1 ADM or RAID-10 ADM stripe in which all drives have URE&#39;s on the same LBA.</li>
	<li style="list-style-type: disc;">A Controller hangs when a drive is failed from a RAID6/60 logical drive when the host issues a Clear Controller Configuration command or any other configuration change command.</li>
	<li style="list-style-type: disc;">The SSD data drive might be set offline (with reason code 0x37) when hot-remove and re-insert during a spare rebuild in progress.</li>
	<li style="list-style-type: disc;">A drive might not be exposed to the OS if the system is rebooted just after the sanitize erase finishes.</li>
	<li style="list-style-type: disc;">UBM backplanes are not detected properly when connected to specific ports (port 7 or above) in the 12Gb SAS Expander Card.</li>
	<li style="list-style-type: disc;">A controller might hang when idle followed by a short burst of I/Os.</li>
	<li style="list-style-type: disc;">The controller might return the previous drive firmware version, after a drive firmware update on SATA drives.</li>
	<li style="list-style-type: disc;">The controller might fail drives (with reason code 0x49, I/O freeze timeout) during expander firmware upgrade on a multi-expander enclosure configuration.</li>
	<li style="list-style-type: disc;">Hot-added drive LED control fails on specific fan-out expander type external enclosure models.</li>
	<li style="list-style-type: disc;">Smart Array Essential series controller might not be responsive when processing sequential I/Os and the firmware coalescing logic can&#39;t get the memory.</li>
	<li style="list-style-type: disc;">Filesystem or application might read old data when SmartCache configurations encounter intermittent write I/O errors to a primary logical drive.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.53" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added UBM type3 backplane support</li>
	<li>Added support for long device model/product ID for SATA drives.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li style="list-style-type: disc;">An issue where the controller might become unresponsive while waiting for a non-existent pre-fetch queue entry.</li>
	<li style="list-style-type: disc;">Host I/O timeouts might occur due to continuing firmware attempts to discover devices during an expander configuration.</li>
	<li style="list-style-type: disc;">A controller lockup problem (with code 0x1E10) might occur when a bad drive with an unsupported block size is connected into slot 0.</li>
	<li style="list-style-type: disc;">A Controller hangs issue when multiple hot-plug and hot remove events (drives or JBODs) were being processed.</li>
	<li style="list-style-type: disc;">A Controller hangs issue on DDR caching enabled logical volumes with sequential read towards the end of the volume.</li>
	<li style="list-style-type: disc;">A Controller hangs issue with outstanding I/Os on a degraded logical volume when the physical drive fails.</li>
	<li style="list-style-type: disc;">A Controller hangs issue if a host I/O and background consistency check simultaneously encounter a RAID-1 ADM stripe in which all drives have URE&#39;s on the same LBA.</li>
	<li style="list-style-type: disc;">A Controller hangs issue when a drive is failed from a RAID6/60 logical drive when the host issues a Clear Controller Configuration command or any other configuration change command.</li>
	<li style="list-style-type: disc;">The SSD data drive might be set offline (with reason code 0x37) when hot-remove and re-insert during a spare rebuild in progress.</li>
	<li style="list-style-type: disc;">A drive might not be exposed to the OS after reboot if the system is rebooted just after the sanitize erase finishes.</li>
	<li style="list-style-type: disc;">UBM backplanes are not detected properly when connected to specific ports (port 7 or above) in an expander card configuration.</li>
	<li style="list-style-type: disc;">A Controller hangs issue when processing idle time followed by a short burst of I/Os.</li>
	<li style="list-style-type: disc;">The controller might return the previous drive firmware version, after a drive firmware update on SATA drives.</li>
	<li style="list-style-type: disc;">The controller might fail drives (with reason code 0x49, I/O freeze timeout) during expander firmware upgrade on a multi-expander enclosure configuration.</li>
	<li style="list-style-type: disc;">Hot-added drive LED control fails on specific fan-out expander type external enclosure models.</li>
	<li style="list-style-type: disc;">sequential I/Os and the firmware coalescing logic can&#39;t get the memory.</li>
	<li style="list-style-type: disc;">Filesystem or application might read old data when SmartCache configurations encounter intermittent write I/O errors to a primary logical drive.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="63eaf8b9f2d74ded922cd74f7d530631" version="2e9859e8a35d46ffa7bcf7db45a1d8ae" lucid_version="MK0960GECQK_x64@HPG3(J)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="J" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (I)" revision="I" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2137f29484a3411eb23b24a938438e8b" version="95eea41a7a4544fdadae05b571b11307" lucid_version="iLO4_fw_Win.x64@2.77-rev1__sc-windows-fw-ilo_en"/>
      <revision_history>
        <revision>
          <version value="2.77" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support to display login banner SSH login</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Potential vulnerabilities in network stack. Click <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbhf04070en_us">here</a> to know more about the Security Vulnerabilities.</li>
	<li>Active directory test may fail during LDAP authentication.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.77" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support to display login banner SSH login</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Potential vulnerabilities in network stack. Click <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbhf04070en_us">here</a> to know more about the Security Vulnerabilities.</li>
	<li>Active directory test may fail during LDAP authentication.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="95e1a7b8a2664cd8b8d67128eff9bb87" version="b36691c8cd494de6b7208672ada2fa4c" lucid_version="neches.asr.win2016.x64@4.7.1.0-rev1__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="4.7.1.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed branding issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modified code to comply with de-branding requirements</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e574ba077b7e40e98fa10de501cd4f19" version="2c58b8c0db4c45c1a31d76575ed74a4f" lucid_version="hp-ams_rhel7_x86-64@2.10.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.10.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed&nbsp;a small amount of memory leak as documented in the Customer Advisory, <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00053824en_us" style="color:#0563c1; text-decoration:underline">a00053824en_us</a></li>
	<li>&nbsp;NVMe drive information is now available in the CPQSE.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.10.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the Following Items:</p>

<ul style="list-style-type:square">
	<li>Added&nbsp;the warning message for users to restart hp-ams service when iLo reset more than twice. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099805en_us" style="color:#0563c1; text-decoration:underline">a00099805en_us</a>.&nbsp;&nbsp;</li>
	<li>When the server detects the physical network cable is plugged or unplugged, hp-ams will send out a trap to notify the administrator about the&nbsp;physical network status change.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="15d448815a234025a6958f5176b1dc77" version="19e300a899134c03aa96a8302798a3d2" lucid_version="MLNX_VPI_CX4_CX5_HCA_FW_package.esxi70@1.0.1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.28.1002:</strong></p>

<p>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)<br />
825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 12.28.1002:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>Firmware for the following devices are updated to 16.29.1016:</strong></p>

<p>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)<br />
872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compared to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Steering DP hash flow groups.</li>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>PCIe Rx modifications to prevent the adapter cards from disappearing from the system.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
	<li>cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>[Beta]&nbsp;Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that prevented&nbsp;VXLAN packets with svlan/ cvlan tag from being matched.</li>
	<li>An issue that caused the&nbsp;eth_wqe_too_small counter to count&nbsp;ODP (On-Demand Paging) page faults.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>An issue that resulted in low performance after enabling the RoCE Accelerator capability. Note:&nbsp;The fix is available when all ports are set as Ethernet.&nbsp;</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.</li>
	<li>An issue that caused&nbsp;the device to go to down IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.&nbsp;</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.28.1002:</strong></p>

<ul>
	<li>An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.27.4000:</strong></p>

<p>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)<br />
825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 12.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>Firmware for the following devices are updated to 16.27.2008:</strong></p>

<p>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)<br />
872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observerd while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="72ce2dc2a1214941a11d7ccaace19196" version="79565131b5714c1bb5ef1c954bb990b6" lucid_version="MB012000JWDFD_ESXi@HPD2(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue during unaligned write commands, found in supplier ongoing lab testing. Includes additional fixes to improve error handling and reliability.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue during unaligned write commands, found in supplier ongoing lab testing. Includes additional fixes to improve error handling and reliability.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="775df1f4997747b1b9988fc3c9990436" version="e8a2ab89b4ca467b9787bf8aa3a783bd" lucid_version="qlogic.online.fw.win.x64_bl@2021.02.01__sc-windows-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for&nbsp;16 Gb&nbsp;products.</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE QMH2672 16Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for 8 Gb and 16 Gb&nbsp;products.</p>

<p>&nbsp;</p>

<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1" style="width:800px">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td style="width:50px">UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE QMH2572 8Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE QMH2672 16Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>16Gb</td>
			<td>6.03.00</td>
			<td>8.08.231</td>
			<td>7.02</td>
			<td>3.43</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>Enhancements have been made to the firmware to prevent and better recover from the unexpected behavior described in Customer Advisory titled: &ldquo;HPE ProLiant, Synergy and Superdome Flex Host Bus Adapters (HBA) - Certain Fibre Channel HBA Firmware May Cause the Operating System to Halt and Potentially Compromise Filesystem Data Integrity&quot; at the following link:</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us</a></p>

<ul>
	<li>Address unexpected behavior when Fibre Channel adapters were simultaneously running traffic to an array which supports 3PAR Persistent Checksum AND another array which is running T10-PI (also known as T10-DIF) or no block checksum technology at all</li>
	<li>Fibre Channel adapter firmware versions were not showing up as expected in the AHS log.</li>
	<li>Port statistics counters would sometimes not update in the event of Loss of Signal or Loss of Sync</li>
	<li>link downs would occur during specific frame sequences used by the HPE XP8 array after array-side link loss</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eb361011be5348dc81ccf25ec5c94210" version="52022173ad2f44149b994b9926f7f040" lucid_version="igb.rhel8@6.2.5-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="6.2.5-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now support HPE Intel Online Firmware Upgrade Utility for Linux x86_64, version (or later) to update firmware</li>
	<li>This product now supports Red Hat Enterprise Linux 8 update 2 and Red Hat Enterprise Linux 8 update 3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.2.3-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b3a8e7e2c4ea466a9b404955f474449e" version="015273f049214524a6bbf4ba7f7f45db" lucid_version="isut.linux_x64@2.8.0.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.8.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.7.1.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fbba430fadcd437fa480e86bae79681f" version="829c3c2d15a641eeba5aebd3a2d8464d" lucid_version="nicfwupg_qlflq_open.vmware@4.13.9__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="4.13.9" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supported NPAR enabling option.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product contains support PLDM firmware upgrade base improvements.</li>
	<li>This product addresses an overheat issue on the network adapters as below,</li>
</ul>

<p style="margin-left:80px">HPE Ethernet 10Gb 2-port BaseT QL41132HLRJ Adapter<br />
HPE Ethernet 10Gb 2-port BaseT QL41132HQRJ OCP3 Adapter</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.12.14" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports firmware upgrade in the ESXi 7.0.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue of inconsistent LED behavior while linking up with different speed.</li>
	<li>This product corrects an issue about failing to restore the factory default value by pressing F7.</li>
	<li>This product addresses an issue where driver doesn&rsquo;t load upon booting up by correct memory relocation.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d1f6d486a5d9456eb4b15539009012ca" version="d0a1b47f94e048e7adc354afd74a4c4d" lucid_version="MLNX_Open_Ethernet_NIC_MFT_FW_package.esxi70@1.0.1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is&nbsp;updated to 14.29.1016:</strong></p>

<p>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)<br />
P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</p>

<p><strong>Firmware for the following devices is&nbsp;updated to 16.29.1016:</strong></p>

<p>P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)<br />
P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)<br />
P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)</p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<p><strong>New Feature and Changes in Version 14.29.1016 and 16.29.1016:</strong></p>

<ul style="list-style-type:square">
	<li>Ethernet wqe_too_small Mode: A per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p style="margin-left:40px">Added support for the following features:</p>

<ul style="list-style-type:square">
	<li>cq_overrun counter: The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>Enabled the capability to allow Virtual Functions to send Pause Frames packets. (Beta)</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
</ul>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<ul style="list-style-type:square">
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p style="margin-left:40px">Added support for the following features:</p>

<ul style="list-style-type:square">
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats:</li>
	<li>Responder Mini CQE With Flow Tag Layout.</li>
	<li>Responder Mini CQE With l3_l4_info Layout.</li>
	<li>Steering DP hash flow groups.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 14.29.1016 and 16.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that caused packets to drop due to header size issues and/or failing checks. This issue was caused due to a Linux issue that caused VFs to set the wrong header size value in wqe_inline_header_mode input.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) might take longer than when MKEY_BY_NAME was disabled.</li>
	<li>In rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that caused the eth_wqe_too_small counter to count ODP page faults.</li>
	<li>A low performance was observed after enabling the RoCE Accelerator capability.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is&nbsp;updated to 14.27.4000:</strong></p>

<p>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)<br />
P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</p>

<p><strong>Firmware for the following devices is&nbsp;updated to 16.27.2008:</strong></p>

<p>P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)<br />
P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)<br />
P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)</p>

<p><strong>New Feature and Changes in Version 14.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observerd while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d217387da75b452f91f63bc9a4605e37" version="51f971e4fd32409face04139ed2d2f7b" lucid_version="emulex_storport_x64.w2k19_rt@12.8.334.6__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.334.6" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;12.8.334.6</p>

<p>The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.165.0 (b)" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;12.6.165.0</p>

<p>Added the following support :</p>

<p><br />
Removed the raw driver file folder.&nbsp; The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ca5f8e8ad5cf4c9a9aaf2d63a599d335" version="204b1cb605dc4eb9b666b1fd2975df06" lucid_version="D2x00.fwsc.linux_x64@0150(B)-rev1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="0150" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fix is added in this version:-</strong></p>

<p>-Removed action over FAULT_SENSED bit due to incorrect algorithm.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0150 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fix is added in this version:-</strong></p>

<p>-Removed action over FAULT_SENSED bit due to incorrect algorithm.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fed7882585434512b7259db2ba5790f0" version="ea1298ea43df48f992d798bd59c9a584" lucid_version="Gen10Plus_UBM1_Backplane_PIC@1.42__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.42" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial release</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8e7aaa71b17c4086a95b8b9f64ce4863" version="2348771c576f408ea0e56f6c69164335" lucid_version="nmlx5_en.vmware67@2020.11.11__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.11.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New Features in smart component version 2020.11.11:</strong></p>

<ul>
	<li>Added support for the following adapters:
	<ul>
		<li>HPE Ethernet 200Gb 1-Port QSFP56 MCX623105AS-VDAT Adapter (HPE Part Number: P10180-B21)</li>
	</ul>
	</li>
</ul>

<p><strong>New features and changes in version 4.17.70.1:</strong></p>

<ul>
	<li>
	<p>Disabled the option of shutting down the link due to power limitation.</p>
	</li>
	<li>
	<p>Support for trusting Differentiated Services Code Point (DSCP) and setting default value for RoCE traffic.</p>
	</li>
	<li>
	<p>New counter that enables the user to query per Virtual Function counters.</p>
	</li>
	<li>
	<p>RX out-of-buffer counter to indicate any lack of software receive buffers.</p>
	</li>
	<li>
	<p>Module parameter to enforce specific RoCE version.</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version&nbsp;in 4.17.70.1:</strong></p>

<ul>
	<li>
	<p>The &quot;esxcli network sriovnic vf stats&quot; command&nbsp;was not supported.When running this command on a &quot;vmknic&quot;, a failure message&nbsp;was displayed.</p>
	</li>
	<li>
	<p>IPv6 as inner packet was not supported.</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.03.09" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New Features in smart component version 2020.03.09:</strong></p>

<ul>
	<li>Added support for the following adapters:
	<ul>
		<li>HPE Ethernet 10/25Gb 2-port 642SFP28 Adapter (HPE Part Number: P24837-B21)</li>
		<li>HPE Ethernet 10Gb 2-port 548SFP+ Adapter (HPE Part Number: P11338-B21)</li>
	</ul>
	</li>
</ul>

<p><strong>New features and changes in version 4.17.70.1:</strong></p>

<ul>
	<li>
	<p>Disabled the option of shutting down the link due to power limitation.</p>
	</li>
	<li>
	<p>Support for trusting Differentiated Services Code Point (DSCP) and setting default value for RoCE traffic.</p>
	</li>
	<li>
	<p>New counter that enables the user to query per Virtual Function counters.</p>
	</li>
	<li>
	<p>RX out-of-buffer counter to indicate any lack of software receive buffers.</p>
	</li>
	<li>
	<p>Module parameter to enforce specific RoCE version.</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version&nbsp;in 4.17.70.1:</strong></p>

<ul>
	<li>
	<p>The &quot;esxcli network sriovnic vf stats&quot; command&nbsp;was not supported.When running this command on a &quot;vmknic&quot;, a failure message&nbsp;was displayed.</p>
	</li>
	<li>
	<p>IPv6 as inner packet was not supported.</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6ca4dd262131408db10af90451555128" version="22261759bff242cc9d768699caebfdca" lucid_version="FWPKG-P23666-B21@20.29.1016__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.29.1016" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New Features and Changes in Version 20.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.</li>
	<li>To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.</li>
	<li>Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.</li>
	<li>Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.29.1016:</strong></p>

<ol>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ol>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1368ab3d45fb40b799c33ccbe297c322" version="66b70385e3914913933aa5e389fcec82" lucid_version="u30.linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="88b0a89daaf348e9967e08f08cad5650" version="7e3f1a803b874274afd2472a9cd4d129" lucid_version="ixgbevf_bl.sles12@4.9.3-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9.3-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 12 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue seen when enabling SRIOV, where the VFs have the same, duplicated MAC address.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.6.2-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8bec8c11bb254125b8c66405c5e73717" version="319a4e81330642a9b203aeffb88a09b5" lucid_version="MB4000GEQNH_MB6000GEQNK_x64@HPGB(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGB" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.</li>
	<li>
	<p>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGB (F)" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.</li>
	<li>
	<p>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</p>
	</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="87b9a1c22150406cbf61d6b300753282" version="5e4c37652d29404b8cc630c5464740c8" lucid_version="MB006000GWJRR_MB008000GWJRT_x64@HPG4(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1af1a5a1ad4c4d1883e16ca0bd801d36" version="dac299ac79e6448e8fb0e697aaecc16f" lucid_version="VK000150GWCNN_VK000240GWCNP_VK000480GWCNQ_ESXi@HPG1(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fd1884928c824890aec3a37db50b22e0" version="af314421c84348a7bbaf951219b40415" lucid_version="netxtreme2.rhel7.x86_64@7.14.76-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="7.14.76-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7 Update 9.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue obtain Medium Dependent Interface(MDI) and Medium Dependent Interface Crossover (MDIX) information when execution ethtool tools</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.14.70-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where the driver Precision Time Protocol (PTP) is not working due to timestamp problem.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ff62b7c54afa40698c7ab166c3e4526e" version="4e3a7ff5414e4f0fa878f1a33e34a0e9" lucid_version="lpfc.sles12.x86_64@12.8.352.11__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.275.14" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.6.275.14</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1158dc08ded5424bbf147255302cf823" version="24d0d92e899c40adb7409cf156f3f39d" lucid_version="MLNX_Open_Ethernet_CX6DX_NIC_MFT_FW_package.x64@1.0.0.3__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is updated to 22.29.1016:</strong></p>

<p>&nbsp;</p>

<p>P25960-B21 (HPE Ethernet 100Gb 2-Port QSFP56 MCX623106AS-CDAT Adapter)</p>

<p>P10180-B21 (Mellanox MCX623105AS-VDAT Ethernet 200Gb 1-port QSFP56 Adapter for HPE)<br />
&nbsp;</p>

<p><strong>New features and changes in version 22.29.1016:</strong></p>

<ul>
	<li>Improved NRZ link performance (RX algorithm).</li>
</ul>

<ul>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Optimized vDPA performance for PPS in scalability of up to 127 devices per port.</li>
	<li>When using a Multi-Host device, the firmware can now discover who is the external SmartNIC host (the Embedded CPU PF (ECPF) ) with the highest index that is responsible for performing offload activities to the adapter card.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
	<li>Changed the default value of DCQCN&#39;s NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Eye-Opening: supported only when using NRZ signal. (Beta)</li>
	<li>Option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order. To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command and set DPP relevant attributes.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>Error statistics and reporting for vDPA.</li>
	<li>IPv6 TSO offload.&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been resolved in firmware version 22.29.1016:</strong></p>

<ul>
	<li>Traffic for virtio hardware offload solution was prevented from &quot;iperf3&quot; in Windows Operating System.</li>
	<li>Traffic for virtio hardware offload solution was prevented from &quot;iperf3 -i 512&quot;.</li>
	<li>The struct virtio_net_hdr was not set properly by the virtio hardware offload solution. The following message appeared in dmesg during traffic: &quot;bad gso: type xx, size: xx&quot;.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs were configured, VM restart (VF/PF FLR) might had taken longer than that of when MKEY_BY_NAME was disabled.</li>
	<li>TCP/IP traffic received by the guest kernel with version higher than 4.10 were&nbsp;unstable because of corrupted GSO header. The following message could be seen from dmegs: &quot;bad gso: type: xx, size: xxxx&quot;.</li>
	<li>Enabling the RoCE Accelerator capability resulted in low performance<br />
	Note:&nbsp;The fix is available when all ports are set as Ethernet.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device&nbsp;is updated to 22.27.6008:</strong></p>

<p>P25960-B21 (HPE Ethernet 100Gb 2-Port QSFP56 MCX623106AS-CDAT Adapter)<br />
&nbsp;</p>

<p><strong>New features and changes in version 22.27.6008:</strong></p>

<ul>
	<li>The following are the minimal software/firmware versions that support PAM4 link speeds when connected using Mellanox NIC to Mellanox Switch and Mellanox NIC to 3rd Party Switches:
	<ul>
		<li>&nbsp;&nbsp; &nbsp;Mellanox Spectrum-3: 30.2007.1142</li>
		<li>&nbsp;&nbsp; &nbsp;Mellanox Spectrum-2: 29.2007.1142</li>
		<li>&nbsp;&nbsp; &nbsp;Switch SDK: 4.4.0920</li>
		<li>&nbsp;&nbsp; &nbsp;Mellanox Onyx: 3.9.0830-038</li>
		<li>&nbsp;&nbsp; &nbsp;SONiC/SAI: 201911</li>
		<li>&nbsp;&nbsp; &nbsp;ConnectX-6 Dx: 22.27.2008</li>
	</ul>
	</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; *Note: NICs with this firmware version support Mellanox-to-Mellanox connectivity with PAM4 link speeds.</p>

<ul>
	<li>Programmable Congestion Control (PCC) is at GA level.</li>
	<li>Enabled TLS offload v1.3 with key size 256.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been resolved in firmware version 22.27.6008:</strong></p>

<ul>
	<li>Encapsulated RoCE traffic to drop when IB padding was required.</li>
	<li>PortXmitWait HW counter to count when not expected due to an inaccuracy in the counter.</li>
	<li>On dual-port device after Rx buffer modification the Physical Function on the second port got restored although no expected. &nbsp;The Rx buffer changes when all Physical Functions resets over one port (through reboot /driver restart / FLR) while there were active Physical Functions over the second port.</li>
	<li>Previous Shared Buffer modifications being overrun after performing Shared Buffer modifications such as SBPR, SBPM, SBCM, the PFCC Flow Control).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8ebc8805a4344ec4a24a5c7109c6e07f" version="65061afb383e470e9c7f6960b19e4067" lucid_version="MK000480GWXFF_MK000960GWXFH_MK001920GWXFK_x64@HPG1(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li> Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4d6b330d7f1d4462bea2b4b6ff4f5e4a" version="f400fbd3c91f4758bd978bf417ba3cb2" lucid_version="EG1800JEHMD_ESXi@HPD6(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="36877a0ed97d40a29cfe6cb469a6e72f" version="155f2be6f76445f3ba2b890959cee8bd" lucid_version="u32.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5ef718b94f9643ad8517d0050338c700" version="4d035c53925a4c87966439d6ecb634b3" lucid_version="mlnx_en_roce.rhel7u8.x86_64.rpm@4.9(A)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.9" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f5e3995830b040538ed866e14afc4c24" version="fa6e7ba979934b8cabc2bc12f19a5fa1" lucid_version="vxn_bl.w2k16@2.1.192.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.1.192.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation libraries, vxnmsg.dll, nicco5.dll, and nicinvxn.dll.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.0.210.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d936b2fd4e0c4dcb9d5ef13b3d9dbd87" version="ed2692789a624911b99c3e9c3d9a446c" lucid_version="broadcom_nxe.w2k19@218.0.32.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="218.0.32.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue where an system are freeze and reboot when system recovering after non-fatal error.</li>
	<li>This product correct an issue which fixes BSOD observed after updating the inbox driver on Windows 2019.</li>
	<li>This product correct an issue which fixes VF will not load on certain Virtual OS when Windows is host OS.&nbsp;</li>
	<li>This product correct an issue which fixes user mode RDMA blue screen of death (BSoD) caused by an IRP SystemBuffer access race condition</li>
	<li>This product corrects a Windows Stop Error blue screen of death (BSoD) seen when uninstalling the NDIS driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="216.0.143.3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2fa1597649f243c092f040a8ecf90232" version="a8ff8cfac95e484bbcb8cf0dfe828ea3" lucid_version="MK000800KWWFE_MK001600KWWFF_MK003200KWWFH_ESXi@HPK3(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="38b83226aeb64480960e8558ac22cab4" version="8e81a9c392934df8a2dba3a99af357eb" lucid_version="qfle3.vmware70@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses a Purple Screen Of Death (PSOD) seen during traffic scheduling.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.05.29" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="664b59f2e0844d92994001b0975488e2" version="4f0319a861474b8fb1a5d09d4d109636" lucid_version="qlogic_windows_smartsan_enablement.x64_win2k12R2_r@1.0.0.1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.0.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3d1400a6e0204fb498134f7e6e3f374a" version="2a9e8bcb26184290af1f6774747a33ca" lucid_version="MB001000GWJAN_MB002000GWFWA_MB004000GWFWB_x64@HPG1(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="C8691" version="d95fe42121e94210a46334bf546bf938" lucid_version="fibreutils_x86_64.linux.RHEL@4.1-1(c)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.1-1" revision="c" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This package supports only&nbsp;Red&nbsp;Hat Enterprise&nbsp;Linux&nbsp;(RHEL) Distros</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1-1 (b)" revision="b" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This package supports only&nbsp;Red&nbsp;Hat Enterprise&nbsp;Linux&nbsp;(RHEL) Distros</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fiixed adpater_info code to display correct Vendor name&nbsp;instead of Unknown</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5cda8f412fa0418489dbcbbf3f49c1b5" version="301e8453cfd041eab752bb3a450f012d" lucid_version="MO001600KWZQP_MO003200KWZQQ_x64@HPK5-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d05081ab9ef4444a874a5310ab9eff91" version="d563d7b60897419bb0d727b5ecae0aac" lucid_version="ixgbevf_bl.sles15@4.9.3-1(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9.3-1" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 15 SP2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue seen when enabling SRIOV, where the VFs have the same, duplicated MAC address.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.6.2-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b197b25ba5a84d17992b28174218a00a" version="c8fe284a6be14bc89b909e10f700ee1b" lucid_version="VK000960JWSSQ_VK001920JWSSR_VK003840JWSST_ESXi@HPD8(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (C)" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:Â <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="760219007fb741b7ab3268ea14a28fcd" version="7aac8abd98544636aff02ea61e5d378a" lucid_version="U25.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2db44a1decee40ff8a1a633e86c57d5c" version="9146bb3190814c4eb84a8024df948900" lucid_version="neches.chif.win2012.x64@4.7.1.0-rev1__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="4.7.1.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed branding issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modified code to comply with de-branding requirements</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ff5f0967b6c84e77920662313dc42a52" version="cdf02b47346d477d93d8c0781c3cfc66" lucid_version="MB010000GWAYN_MB008000GWAYL_x64@HPG5(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="af9477b9fa00462698ac47498ea633b5" version="dd3be1b1df9944b49f6055e241d06d1a" lucid_version="isut-esxi.esxi67@2021.04.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.12.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4de9a363a422456faca983d193ca352a" version="372b151edf3c48a0b85b9ff026b6c26a" lucid_version="U31.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d00882018d64492aa4a5bc81f394c4dc" version="99670676551745dbae24e130eb0f45c0" lucid_version="A46.Win.x64@2.42_02-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>System Programable Logic CPLD version 34<P><B>Problems Fixed:</B></P>Addressed an issue that could cause a slight degradation of performance.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.38_11-06-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the server may encounter an Uncorrectable Machine Check Exception (UMCE) with a Bank of 0x00000005 or an Uncorrectable PCI Express Error with status 0x00040000 or 0x00010000. These errors will result in either an unexpected reset of the server or the server becoming unresponsive (such as Blue Screen with Windows, Purple Screen with VMware, or Kernel Panic with Linux).  This revision of the System ROM includes the latest revision of AMD firmware which addresses this issue.  This issue is not unique to HPE servers.<p>Addressed an issue where the chassis name was not being reported for inventory control.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="824707fd6d4844feaef370452b0a3a3e" version="09037019499b4a2daffc07b220d87631" lucid_version="U44.Linux@2.20_10-27-2020-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.20_10-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>Addressed an issue where the &quot;Minimum Processor Idle Power Package C-State&quot; RBSU option was missing.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.20_10-27-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="63a0b4d1fd5143328925661934c3ed2a" version="2895c0aa6513432da679e81ca802c988" lucid_version="mlnx_en_roce_mlx5.rhel7u8.x86_64.rpm@5.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.2:</strong></p>

<p><strong>For ConnectX-5 Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>CQE compression support for Rx multi-strides packets.</li>
		<li>Configuring QoS on a single QP or on a group of QPs.</li>
		<li>Encap/decap hardware offload of IPv4 traffic over MPLS-over-UDP. This can be used in networks with MPLS routers to achieve more efficient routing.</li>
		<li>Connection tracking rules on VFs to forward traffic from one VF to the other.</li>
		<li>Offloading sFlow sampling rules.</li>
	</ul>
	</li>
</ul>

<p><strong>For ConnectX-5 Adapters and ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>A locking mechanism to enable parallel insertion of rules into the software steering using the mlx5dv_dr API. The parallel insertion improves the insertion rate and takes place when adding Rx and Tx rules via the FDB domain.</li>
		<li>Option to match mlx5dv_dr API on Geneve tunnel using a dynamic flex parser. The option header consists of class, type, length and data. The parser should be configured using devx command, after which a rule can be created to match on parser ID and data.</li>
		<li>Geneve tunneling offload, including matching on extension header.</li>
		<li>Parallel insertion and deletion of offloaded rules using multiple&nbsp;OVS threads.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>[Beta] Modify GTP-U TEID. This support requires flex parser&nbsp;configuration.</li>
		<li>[Beta] Improved performance of OVS Connection Tracking flows by&nbsp;enabling the merge of the multi-table flow matches and actions into one joint flow.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters and above:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Transmitted packet timestamping accuracy can be improved when using a timestamp generated at the port level instead of a timestamp generated upon CQE creation. Tx port time-stamping better reflects the actual time of a packet&#39;s transmission. This feature is disabled by default. The feature can be enabled or disabled using the following command. ethtool --set-priv-flags tx_port_ts on / off.</li>
	<li>Offloading tunnel rules when the source interface is VF (in addition to uplink) in the Hypervisor.</li>
	<li>Using Mirroring Offload with Connection Tracking.</li>
	<li>ASO flow meter using the mlx5dv_dr API, which allows for monitoring the packet rate for specific flows. When a packet hits a flow that is connected to a flow meter, the rate of packets through this meter is evaluated, and the packet is marked with a color copied into one of the C registers, according to the current rate compared to the reference rate.</li>
	<li>ASO first hit using the mlx5dv_dr API, which allows for tracking rule hits by packets. When a packet hits a rule with the ASO first hit action, a flag is set indicating this event, and the original value of the flag is copied to one of the C registers.</li>
	<li>mlx5dv_dr API support for matching on a new field &quot;gtpu_first_ext_dw_0&quot;. This field enables packet filtering based on the GTP-U first extension header (first dword only). To enable parsing of tunnel GTP-U extension header, run the following command. ./cloud_fw_reset.py FLEX_PARSER_PROFILE_ENABLE=3.</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Lx Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>IPsec full offload support for extended sequence number, replay protection window and lifetime packet limit.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;All HCA&#39;s:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>New query GID API that allows for querying a single GID entry by its port and GID index, or querying for all GID tables of a specific device. This API works over ioctl instead of sysfs, which accelerates the querying process.</li>
		<li>Performing multi-host firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reload.</li>
		<li>[Alpha] Firmware live patching in the driver. Live patching updates the firmware without the need to perform firmware reset. However, it can only be applied in scenarios where the difference between the current and new firmware versions are minor, which is decided upon by the firmware itself.</li>
		<li>devlink tool for performing firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reloads the current firmware image from the flash in case no new firmware was pending. For further information, please refer to the the devlink man page.</li>
		<li>A resiliency mechanism for the driver to manually poll the command event queue (EQ) in case of a command timeout. In case the resiliency mechanism finds unhandled event queue entry (EQE) due to a lost interrupt, the driver will handle it, after which the command interface returns to a healthy state.</li>
		<li>Setting a sniffer private flag is deprecated and no longer required. In order to capture offloaded/RoCE traffic, tcpdump can now be run on the RDMA device.</li>
		<li>Added per-port reporters to devlink health to manage per-port health activities. Users can now access the devlink port reporters by specifying the port index in addition to the device devlink name through the devlink health commands API. This update was first introduced in iproute2 v5.8. As part of this feature, mlx5e Tx and Rx reporters are now redefined as devlink port reporters. For examples, please see devlink-health manpage</li>
		<li>Optimized memory consumption of memory registration in huge page systems. As an example, in a 2MB huge page system, 600 MB would be saved for 100 GB memory registration.</li>
		<li>mlx5dv API to modify the configured UDP source port for RoCE packets of a given RC/UC QP when QP is in RTS state.</li>
		<li>Accelerating Tx datapath by saving PCI bandwidth and CPU utilization. The savings are achieved by aggregating multiple packets into a single WQE. The feature is driven by xmit_more for certain traffic types, such as UDP.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.2:</strong></p>

<ul>
	<li>Clearing min_rate on all SR-IOV legacy VFs after setting min_rate to at least one of the VFs did not disable QoS min_rate.</li>
	<li>An empty /usr/src/mlnx-ofa_kernel/default is now no longer created.</li>
	<li>An issue where installing packages through a repository failed after generation of metapackages using --add-kernel-support. The failure occurred due to excessive and incorrect Obsolete headers in those metapackages.Enabled installation of mlnx-ofa_kernel package to /bin/python3 instead of / usr/bin/python3 on RHEL 8.x systems.</li>
	<li>All IPoIB offload packets were wrongly counted as rx_csum_complete. These packets are now identified as rx_csum_unnecessary packets.</li>
	<li>mlx5dv_dr_rule_destroy segmentation fault could happen in rare cases with multiple rules on the same matcher with a different number of actions. This could happen after reusing an already deleted rule memory with less actions.</li>
	<li>An issue of moving to SwitchDev mode after configuring DSCP (Differentiated Service Code Point).</li>
	<li>Global traffic class configuration did not take effect on DC QPs (Dynamically Connected Queue Pairs).</li>
	<li>ib_send_bw traffic frequently dropped to zero when RDMA CM was used, because of incorrect&nbsp;min_rnr_timer setting on the responder side. The min_rnr_timer setting is now aligned with the setting in non-RDMA CM cases.</li>
	<li>Traffic did not pass over VFs with VST QinQ feature is enabled.</li>
	<li>When traffic was sent over Geneve VLAN with Tx VLAN offload enabled and TSO (TCP Segmentation Offload)&nbsp;or Tx csum enabled, traffic could be dropped and not sent to the wire.</li>
	<li>An issue that caused the firmware to restart upon installing mlnxofed-dpdk-upstream-libs package manually.</li>
	<li>Bad utility paths in rdma-core &quot;dracut&quot; hooks on SLES systems, which used to result in the following errors when running &quot;dracut&quot; with the &quot;--add rdma&quot; option. dracut-install:
	<ul>
		<li>ERROR: installing &lsquo;/usr/libexec/mlx4-setup.sh&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/mlx4-setup.sh dracut-install: ERROR: installing &lsquo;/usr/libexec/rdma-set-sriov-vf&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/rdma-set-sriov-vf</li>
	</ul>
	</li>
	<li>Traffic class value was not updated in DCT when set via sysfs.</li>
	<li>A doorbell loss issue on AMD platforms with Secure Memory Encryption (SME).</li>
	<li>Registering memory using mlx5dv_devx_umem_reg while forking. Without this fix, applications which use fork() or similar syscalls while using a memory registered with umem_reg could hang due to incorrect physical page mapping. This fix requires setting the IBV_FORK_SAFE environment variable.</li>
	<li>When&nbsp;unbinding the device resulted in the following message being printed to the dmesg: &quot;failed to disable DC tracer&quot;</li>
	<li>Content of file /sys/class/net//statistics/ multicast might have been out of date and might have displayed values lower than the real values.</li>
	<li>ERSPAN (Encapsulated Remote SPAN) protocol was available only when turning off Tx checksum offload.</li>
	<li>A udev script issue which caused non-mellanox devices to be renamed.</li>
	<li>Missing representor statistics when using ifconfig.</li>
	<li>Fixed wrong value of skb mark of received packets on representors.</li>
	<li>An issue which caused second port representors to be named as first port representors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.1:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>The user can now set a packet pacing rate on the special queues that forward traffic from one physical port to the other.</li>
		<li>Connection Tracking (TC) offload on network interfaces that are in NIC mode, as opposed to SwitchDev mode. Note: This support is currently available for interfaces with physical functions only.</li>
		<li>Limiting SMP MADs on the wire using a Send window mechanism. This allows the user to keep track of the outstanding number of SMP MADs per-port, and allows for limiting this number to shape traffic when the pace of SMP MADs requires control.</li>
		<li>Direct Rule (DR) API support for sampling action to allow duplication and sampling of some ratio of the traffic. The API also allows to perform a set of different DR actions on the sampled traffic.</li>
	</ul>
	</li>
	<li>Enabled on-demand device memory sync to free cached memory.&nbsp;</li>
	<li>Simplified the sanity test that verified which systems must use python3 and not python2, so that when rebuilding the kernel packages using --add-kernel-support, the systems based on RHEL/CentOS 8 were detected.&nbsp;</li>
	<li>Added back rx_dct_connect counter that queries the number of received connection requests for the associated DCTs</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.1:</strong></p>

<ul>
	<li>Extended mlx5 recovery-flow delay on VF driver when PCI interface went down</li>
	<li>ibv_get_device_list returned only accessible devices.</li>
	<li>&ldquo;rpmbuild&rdquo; (that includes basic support for building RPM packages) was not installed by the install script on SLES15 SPx systems when trying to rebuild packages.</li>
	<li>AF_XDP was not functional.</li>
	<li>neohost-backend and neohost-sdk packages were not properly removed by the uninstallation procedure and might have required manual removal before re-installing or upgrading MLNX_OFED driver.</li>
	<li>During MLNX_OFED installation, warning messages related to modules iw_cxgb3 and iw_nes might have appeared in the log.</li>
	<li>Command timeouts occurred when the Hypervisor disabled the VF&#39;s PCI interface. This fix reduces the device removal time to 2 seconds.</li>
	<li>MLNX_OFED/MLNX_EN installer will no longer automatically remove the spdk package when installing the driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7e6f42aebfdb4390968da43b36518880" version="0b1ae9cd6a5349fcb4307e9c7c256f3a" lucid_version="EH000900JWHPK_EH000600JWHPH_x64@HPD4(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="71f736a9e5684fd69f80904bf78b29e9" version="2b7fdd3a7c274bdea28db8ee0c471f65" lucid_version="XP0120GFJSL_XP0240GFJSN_ESXi@HPS4(I)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPS4" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPS4 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2cade22bb0f84fafbf250afecb7afed8" version="22a50b5139094a71ab5c13ffc8671d1d" lucid_version="i38.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled (TXT is disabled by default). This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a15fe0bcd3c0422abe0c1c2506d32d09" version="ef799ebf0e18406497321c1c09645963" lucid_version="u23.linux@2.90_11-27-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.90_11-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode: 0x000000E2 (CPUID 506E3). This Intel microcode patch provide mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-8696 and CVE-2020-8698. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381. These issues are not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.88_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9).</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381 and INTEL-SA-00389. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="353da98f5ded4f35807a605192278e9f" version="6630e026aa824f819547eacd3720a502" lucid_version="ql_iscsiuio_bl.sles15sp0@2.11.5.13-3(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.11.5.13-3" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product has&nbsp;been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.11.5.13-3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an&nbsp;iSCSI BFS failure with VLAN.</p>

<p>This product addresses an&nbsp;iSCSI discovery failure with VLAN.</p>

<p>This product addresses an issue where&nbsp;an iSCSI portal is&nbsp;discovered with invalid an VLAN ID.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ce67f450aba744c2b5fc3e256cda38aa" version="f58826691d8540a791a67831e3f5c4f6" lucid_version="p92.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b243398aaeca47f7be44fb080b998e4c" version="96ff02627e234c0d8d0bd71f16b745b7" lucid_version="hp-health_sles15_x86-64@10.9.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="10.9.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>TBD</li>
	<li>TBD</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.9.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Modified the loop initial values in hpasmcli from 2 to 0.</li>
	<li>Modifications to check the read and write variables to match RBSU in Legacy and UEFI mode</li>
	<li>Updated the hpasmcli check string to correctly report the impitool information.</li>
	<li>Remove the redundant serial embedded and com ports</li>
	<li>Addressed&nbsp;IML message size limitation from 36 to 212 bytes</li>
	<li>Support for hp-health in OS security boot</li>
	<li>Added supporting &ldquo;quote mark&rdquo; in SET NAME command</li>
	<li>Enabled to set PXE as boot first&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="543d676d322b4e8ab4ce97b5bffa1a41" version="f44687c8dcd64c7abd89abc29bd744da" lucid_version="MB6000GVYYU_ESXi@HPG2(H)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3dd3ab05c92946afa133f2b171e42532" version="bd0709790e3f448c85ecd1e2a9d6ef09" lucid_version="hp-ams_sles15_x86-64@2.10.3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.10.3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed&nbsp;a small amount of memory leak as documented in the Customer Advisory, <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00053824en_us" style="color:#0563c1; text-decoration:underline">a00053824en_us</a></li>
	<li>&nbsp;NVMe drive information is now available in the CPQSE.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.10.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhancements added in this release:</p>

<ul>
	<li>Support for SUSE Linux Enterprise Server 15 Service Pack 2&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the Following Items:</p>

<ul style="list-style-type:square">
	<li>Added&nbsp;the warning message for users to restart hp-ams service when iLo reset more than twice. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099805en_us" style="color:#0563c1; text-decoration:underline">a00099805en_us</a>.&nbsp;&nbsp;</li>
	<li>When the server detects the physical network cable is plugged or unplugged, hp-ams will send out a trap to notify the administrator about the&nbsp;physical network status change.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7a5bb5126715458dbee6bc8ea5d0f887" version="bf8418db76594023a69e3b161995c0c7" lucid_version="VR000150GWEPP_VR000480GWEPR_x64@HPG1(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a timing issue which can cause the drive to become non-functional.</li>
	<li>Fixes VPD Log D0h reported drive Sanitize times.</li>
	<li>Adds support for Security Log Page BBh.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (D)" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a timing issue which can cause the drive to become non-functional.</li>
	<li>Fixes VPD Log D0h reported drive Sanitize times. </li>
	<li>Adds support for Security Log Page BBh.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="07a5f3ddb9bd4168818fb38406e49473" version="86714b3d614c42dcafc335f58ebfb260" lucid_version="MO000400JWUFT_MO000800JWUFU_MO001600JWUFV_x64@HPD3(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This release corrects logical block address mismatches that could results in partial or total data loss.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f9c6be089c7b4d0089fc2a6d2c32cc55" version="97abd2efacfc4bfdae192af24486707f" lucid_version="U21.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c67540411e6b4fb08ed7b6799938f22f" version="c4a83114b69343288bcd275913f52148" lucid_version="i38.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled (TXT is disabled by default). This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d1dc734770d8403db0527a4d4393f35a" version="0940f479dfe24710aec0c6f45c90e8d2" lucid_version="i40ea.w2k12_r2@1.13.104.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.13.104.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an traffic packets making cert failure seen when packets transferred to VLAN after RDMA function enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.171.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product added implementation of Advanced Link Speed functionality in Physical Function (PF) driver that are supports dynamic link speed changes.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which Blue Screen of Death （BSOD） (0x133) occurred with Remote Access Role service during shutdown.</li>
	<li>This product correct an issue which system crashed after few modifying Intel&reg; Advanced Network Services (Intel&reg; ans) Team type with tagged Virtual Local Area Network (VLAN).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bafc8d47aead420a9621e8d49861aa9b" version="f45774c7d9c14cc686324d8d494498f7" lucid_version="a43.fwpkg@2.40_02-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p><p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.</p><p>Added driver and option to enable SmartRAID SW RAID support for direct attached SATA and NVMe drives.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the fan runs at a higher than expected speed after upgrading the firmware of HPE Smart Array E208i or E408i to version 3.0.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.38_10-30-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices.  This option would only be used for PCIe Adapters that support his level of bifurcation. <p>Added support to increase the maximum amount of system memory to 8TB.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the server may encounter an Uncorrectable Machine Check Exception (UMCE) with a Bank of 0x00000005 or an Uncorrectable PCI Express Error with status 0x00040000 or 0x00010000. These errors will result in either an unexpected reset of the server or the server becoming unresponsive (such as Blue Screen with Windows, Purple Screen with VMware, or Kernel Panic with Linux).  This revision of the System ROM includes the latest revision of AMD firmware which addresses this issue.  This issue is not unique to HPE servers.<p>Addressed a rare issue where the system may fail to boot after a warm reset.<p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.<p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="334426b326da4b9caa59be228e5282e3" version="8c10920ef1bd45e3b231adbb71dd8182" lucid_version="MB4000JEFNC_MB6000JEFND_ESXi@HPD9(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5eebb17653054977b3ae3cbb9a44ff98" version="f27cd93da4854484b060dd22012ce25b" lucid_version="MB6000GEQUT_MB8000GEQUU_x64@HPGB(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGB" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</li>
	<li>Online firmware update fails when drives are connected behind AHCI controller.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGB (F)" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was only found during supplier ongoing reliability testing.</li>
	<li>Online firmware update fails when drives are connected behind AHCI controller.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="862f9bdea0634dd0aa757317bd803752" version="d477bf04e62349f99e60465a9b526ca4" lucid_version="Shenandoah.esxi6.7_bundle@2021.04.01-rev2__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2021.04.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial build</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="15c5494e659e4865b78e60077bae7860" version="db2c9664d02d465e84e97d4eba236106" lucid_version="VS000480KXALB_x64@85030G00(C)__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="85030G00" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added Support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="85030G00 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added Support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fbb53cf22a594dbb99b8c7f89e562124" version="fa9701a0119b470cbc45b640bd256a8a" lucid_version="nicfwpkg_intel_e810_xxv2ocp@2.24__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="2.24" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial version</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="050c92fea0f045599773c67729354d3b" version="647888da476047b4b4689fc09e488159" lucid_version="qlgc_openiscsi.sles15sp0@2.0-873.113-1(D)-rev1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.0-873.113-1" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product no longer supports Synergy servers and devices. Synergy servers and devices are now supported by the&nbsp;<a href="https://www.hpe.com/global/swpublishing/MTX-665f7d608e84429d87b3a76e7d">HPE Synergy QLogic FastLinQ Open-iSCSI Driver for SUSE Linux Enterprise Server 15 SP0</a>.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.0-873.113-1 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7c150c6f26c6491f9b995cd907650c31" version="b3201d62efc640b6ac6d2654a82d8e1c" lucid_version="ixgben_bl.vmware65@2019.12.20__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2019.12.20" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects a&nbsp;recursion termination condition so that recursion&nbsp;correctly ends in the case of&nbsp; PCIe link down.</p>

<p>This product addresses an issue where the ixgben driver has high CPU overhead&nbsp;when an SFP+ module is absent.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="37f4d88a2594441eb8937501d8ada85b" version="824d598247334d6f9671f06ca6b53baa" lucid_version="be2net_bl.rhel8@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 8, Updates 2&nbsp;and 3.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1261.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ae8b95207bc948489c851dd62c16f373" version="419acecd87774070a8ee0e9e4def2780" lucid_version="EO000400JWDKP_EO000800JWDKQ_EO001600JWDKR_x64@HPD2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="459b31cbafbe408eaf0a96421248c984" version="8450ccd328854ea9809a2a03127483cc" lucid_version="MZXL5800HBHQ-000H3_MZXL51T6HBJR-000H3_MZXL53T2_x64@MPK73H5Q-rev1__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="MPK73H5Q" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="MPK73H5Q" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting .</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d7031a8852f2411096f049c632e0a499" version="7cbc4402f8ac416295139293310220ee" lucid_version="ixn.w2k16@4.1.199.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.199.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1.131.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5d9285c19f4844c191173be5431c0cba" version="41764e46de834faeba4da5c0e5ad3fbd" lucid_version="EG0300JEHLV_EG0600JEHMA_EG0900JEHMB_x64@HPD5(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="066e9dcf95574ff7928a5c7761b7f85a" version="4fb63509eede447fa8ac3863859c9e23" lucid_version="mlnx_en_roce_mlx5.sles15sp1.x86_64.rpm@5.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.2:</strong></p>

<p><strong>For ConnectX-5 Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>CQE compression support for Rx multi-strides packets.</li>
		<li>Configuring QoS on a single QP or on a group of QPs.</li>
		<li>Encap/decap hardware offload of IPv4 traffic over MPLS-over-UDP. This can be used in networks with MPLS routers to achieve more efficient routing.</li>
		<li>Connection tracking rules on VFs to forward traffic from one VF to the other.</li>
		<li>Offloading sFlow sampling rules.</li>
	</ul>
	</li>
</ul>

<p><strong>For ConnectX-5 Adapters and ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>A locking mechanism to enable parallel insertion of rules into the software steering using the mlx5dv_dr API. The parallel insertion improves the insertion rate and takes place when adding Rx and Tx rules via the FDB domain.</li>
		<li>Option to match mlx5dv_dr API on Geneve tunnel using a dynamic flex parser. The option header consists of class, type, length and data. The parser should be configured using devx command, after which a rule can be created to match on parser ID and data.</li>
		<li>Geneve tunneling offload, including matching on extension header.</li>
		<li>Parallel insertion and deletion of offloaded rules using multiple&nbsp;OVS threads.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>[Beta] Modify GTP-U TEID. This support requires flex parser&nbsp;configuration.</li>
		<li>[Beta] Improved performance of OVS Connection Tracking flows by&nbsp;enabling the merge of the multi-table flow matches and actions into one joint flow.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters and above:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Transmitted packet timestamping accuracy can be improved when using a timestamp generated at the port level instead of a timestamp generated upon CQE creation. Tx port time-stamping better reflects the actual time of a packet&#39;s transmission. This feature is disabled by default. The feature can be enabled or disabled using the following command. ethtool --set-priv-flags tx_port_ts on / off.</li>
	<li>Offloading tunnel rules when the source interface is VF (in addition to uplink) in the Hypervisor.</li>
	<li>Using Mirroring Offload with Connection Tracking.</li>
	<li>ASO flow meter using the mlx5dv_dr API, which allows for monitoring the packet rate for specific flows. When a packet hits a flow that is connected to a flow meter, the rate of packets through this meter is evaluated, and the packet is marked with a color copied into one of the C registers, according to the current rate compared to the reference rate.</li>
	<li>ASO first hit using the mlx5dv_dr API, which allows for tracking rule hits by packets. When a packet hits a rule with the ASO first hit action, a flag is set indicating this event, and the original value of the flag is copied to one of the C registers.</li>
	<li>mlx5dv_dr API support for matching on a new field &quot;gtpu_first_ext_dw_0&quot;. This field enables packet filtering based on the GTP-U first extension header (first dword only). To enable parsing of tunnel GTP-U extension header, run the following command. ./cloud_fw_reset.py FLEX_PARSER_PROFILE_ENABLE=3.</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Lx Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>IPsec full offload support for extended sequence number, replay protection window and lifetime packet limit.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;All HCA&#39;s:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>New query GID API that allows for querying a single GID entry by its port and GID index, or querying for all GID tables of a specific device. This API works over ioctl instead of sysfs, which accelerates the querying process.</li>
		<li>Performing multi-host firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reload.</li>
		<li>[Alpha] Firmware live patching in the driver. Live patching updates the firmware without the need to perform firmware reset. However, it can only be applied in scenarios where the difference between the current and new firmware versions are minor, which is decided upon by the firmware itself.</li>
		<li>devlink tool for performing firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reloads the current firmware image from the flash in case no new firmware was pending. For further information, please refer to the the devlink man page.</li>
		<li>A resiliency mechanism for the driver to manually poll the command event queue (EQ) in case of a command timeout. In case the resiliency mechanism finds unhandled event queue entry (EQE) due to a lost interrupt, the driver will handle it, after which the command interface returns to a healthy state.</li>
		<li>Setting a sniffer private flag is deprecated and no longer required. In order to capture offloaded/RoCE traffic, tcpdump can now be run on the RDMA device.</li>
		<li>Added per-port reporters to devlink health to manage per-port health activities. Users can now access the devlink port reporters by specifying the port index in addition to the device devlink name through the devlink health commands API. This update was first introduced in iproute2 v5.8. As part of this feature, mlx5e Tx and Rx reporters are now redefined as devlink port reporters. For examples, please see devlink-health manpage</li>
		<li>Optimized memory consumption of memory registration in huge page systems. As an example, in a 2MB huge page system, 600 MB would be saved for 100 GB memory registration.</li>
		<li>mlx5dv API to modify the configured UDP source port for RoCE packets of a given RC/UC QP when QP is in RTS state.</li>
		<li>Accelerating Tx datapath by saving PCI bandwidth and CPU utilization. The savings are achieved by aggregating multiple packets into a single WQE. The feature is driven by xmit_more for certain traffic types, such as UDP.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.2:</strong></p>

<ul>
	<li>Clearing min_rate on all SR-IOV legacy VFs after setting min_rate to at least one of the VFs did not disable QoS min_rate.</li>
	<li>An empty /usr/src/mlnx-ofa_kernel/default is now no longer created.</li>
	<li>An issue where installing packages through a repository failed after generation of metapackages using --add-kernel-support. The failure occurred due to excessive and incorrect Obsolete headers in those metapackages.Enabled installation of mlnx-ofa_kernel package to /bin/python3 instead of / usr/bin/python3 on RHEL 8.x systems.</li>
	<li>All IPoIB offload packets were wrongly counted as rx_csum_complete. These packets are now identified as rx_csum_unnecessary packets.</li>
	<li>mlx5dv_dr_rule_destroy segmentation fault could happen in rare cases with multiple rules on the same matcher with a different number of actions. This could happen after reusing an already deleted rule memory with less actions.</li>
	<li>An issue of moving to SwitchDev mode after configuring DSCP (Differentiated Service Code Point).</li>
	<li>Global traffic class configuration did not take effect on DC QPs (Dynamically Connected Queue Pairs).</li>
	<li>ib_send_bw traffic frequently dropped to zero when RDMA CM was used, because of incorrect&nbsp;min_rnr_timer setting on the responder side. The min_rnr_timer setting is now aligned with the setting in non-RDMA CM cases.</li>
	<li>Traffic did not pass over VFs with VST QinQ feature is enabled.</li>
	<li>When traffic was sent over Geneve VLAN with Tx VLAN offload enabled and TSO (TCP Segmentation Offload)&nbsp;or Tx csum enabled, traffic could be dropped and not sent to the wire.</li>
	<li>An issue that caused the firmware to restart upon installing mlnxofed-dpdk-upstream-libs package manually.</li>
	<li>Bad utility paths in rdma-core &quot;dracut&quot; hooks on SLES systems, which used to result in the following errors when running &quot;dracut&quot; with the &quot;--add rdma&quot; option. dracut-install:
	<ul>
		<li>ERROR: installing &lsquo;/usr/libexec/mlx4-setup.sh&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/mlx4-setup.sh dracut-install: ERROR: installing &lsquo;/usr/libexec/rdma-set-sriov-vf&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/rdma-set-sriov-vf</li>
	</ul>
	</li>
	<li>Traffic class value was not updated in DCT when set via sysfs.</li>
	<li>A doorbell loss issue on AMD platforms with Secure Memory Encryption (SME).</li>
	<li>Registering memory using mlx5dv_devx_umem_reg while forking. Without this fix, applications which use fork() or similar syscalls while using a memory registered with umem_reg could hang due to incorrect physical page mapping. This fix requires setting the IBV_FORK_SAFE environment variable.</li>
	<li>When&nbsp;unbinding the device resulted in the following message being printed to the dmesg: &quot;failed to disable DC tracer&quot;</li>
	<li>Content of file /sys/class/net//statistics/ multicast might have been out of date and might have displayed values lower than the real values.</li>
	<li>ERSPAN (Encapsulated Remote SPAN) protocol was available only when turning off Tx checksum offload.</li>
	<li>A udev script issue which caused non-mellanox devices to be renamed.</li>
	<li>Missing representor statistics when using ifconfig.</li>
	<li>Fixed wrong value of skb mark of received packets on representors.</li>
	<li>An issue which caused second port representors to be named as first port representors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.1:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>The user can now set a packet pacing rate on the special queues that forward traffic from one physical port to the other.</li>
		<li>Connection Tracking (TC) offload on network interfaces that are in NIC mode, as opposed to SwitchDev mode. Note: This support is currently available for interfaces with physical functions only.</li>
		<li>Limiting SMP MADs on the wire using a Send window mechanism. This allows the user to keep track of the outstanding number of SMP MADs per-port, and allows for limiting this number to shape traffic when the pace of SMP MADs requires control.</li>
		<li>Direct Rule (DR) API support for sampling action to allow duplication and sampling of some ratio of the traffic. The API also allows to perform a set of different DR actions on the sampled traffic.</li>
	</ul>
	</li>
	<li>Enabled on-demand device memory sync to free cached memory.&nbsp;</li>
	<li>Simplified the sanity test that verified which systems must use python3 and not python2, so that when rebuilding the kernel packages using --add-kernel-support, the systems based on RHEL/CentOS 8 were detected.&nbsp;</li>
	<li>Added back rx_dct_connect counter that queries the number of received connection requests for the associated DCTs</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.1:</strong></p>

<ul>
	<li>Extended mlx5 recovery-flow delay on VF driver when PCI interface went down</li>
	<li>ibv_get_device_list returned only accessible devices.</li>
	<li>&ldquo;rpmbuild&rdquo; (that includes basic support for building RPM packages) was not installed by the install script on SLES15 SPx systems when trying to rebuild packages.</li>
	<li>AF_XDP was not functional.</li>
	<li>neohost-backend and neohost-sdk packages were not properly removed by the uninstallation procedure and might have required manual removal before re-installing or upgrading MLNX_OFED driver.</li>
	<li>During MLNX_OFED installation, warning messages related to modules iw_cxgb3 and iw_nes might have appeared in the log.</li>
	<li>Command timeouts occurred when the Hypervisor disabled the VF&#39;s PCI interface. This fix reduces the device removal time to 2 seconds.</li>
	<li>MLNX_OFED/MLNX_EN installer will no longer automatically remove the spdk package when installing the driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e9e3449278f14c8cb84369f1b3996ad4" version="b3774521b9e04341be6ae0de58dfc045" lucid_version="Mesa_Verde_P824i-p_Lin@24.23.0-0043(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="24.23.0-0043" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Build</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="24.23.0-0043 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Over-temp issue was a false IML due to a &gt;=60C threshold, modified the threshold to &gt;65C in new version.</p>

<p>Please reference Customer Advisory <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00101958en_us" style="color:#0563c1; text-decoration:underline">a00101958en_us</a></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="228e6aefb0ce46a0a7e230319e326d29" version="4d952a6acb074ecb9900f4d6f3b7bd27" lucid_version="qlogic_storport_x64.w2k16_rt@9.4.2.20__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="9.4.2.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version 9.4.2.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.4.1.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version 9.4.1.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2f321a74cb604b5798705f3942acaadd" version="eec30bdcf1c449d1a21e206365c868f4" lucid_version="qedentv.vmware67@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses a Purple Screen Of Death (PSOD) seen on systems operating in a complicated VLAN environment.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.10.00" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Logging packet drops and queue allocation entries in OS log. Interrupt was received on a secondary RSS queue fp before enabling net poll. Due to that netpoll routine was not scheduled. The change is to update IGU indices and enable the interrupt if such a condition arises.</li>
	<li>This product addresses an iSCSI storage connection issues about the storage system receiving out of order packets from the iSCSI driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d152e4f9638d4a6a962a3424ad625ef5" version="8bc0969a54934136bbdc4140c0100be2" lucid_version="A41.Linux@2.44_11-13-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.44_11-13-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices.  This option would only be used for PCIe Adapters that support his level of bifurcation. </p><p>Added support to increase the maximum amount of system memory to 8TB.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed a rare issue where the system may fail to boot after a warm reset.</p><p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.</p><p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.42_07-17-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option for DRAM Burst Refresh Mode to provide mitigation for TRRespass and Targeted Row Refresh exploits. This option should be configured to Disabled to mitigate the TRRespass vulnerability. Setting this option to Disabled may have a minimal impact to system performance. The default setting is Enabled.</p>

<p>Added a new BIOS/Platform Configuration (RBSU) option in the Minimum Processor Idle Power Core C-State setting for C1 State. This option allows for power savings during certain workloads without the performance impacts of C6 State.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where uncorrectable memory errors are seen when running memory intensive workloads with LRDIMMs.</p>

<p>Address an issue that could cause a slight degradation of performance.</p>

<p>Resolved an issue with NVMe hot add or removal which may result in an unrecoverable I/O error reported in the Integrated Management Log (IML).</p>

<p>Addressed an issue where the UEFI Shell command GetPciRom may not display information for PCI expansion device drivers.</p>

<p>Addressed an extremely intermittent issue with AMD Epyc 1st Gen processors that would cause a critical error and system reset.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cfa8fbdb2f4a4c81b7b1ee3f89f284e0" version="752b27a97c004385af78833ed5af4ab7" lucid_version="u30.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e498500c87604ddabe3d9c5c037f53fc" version="a24e504d63ba497f8869e7abcbfc2968" lucid_version="emulex.fc.fw.lin.x64_bl@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE 16Gb LPe1605 Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>16Gb</td>
			<td>12.8.352.12</td>
			<td>12.8.352.12</td>
			<td>12.8.352.10</td>
			<td>12.8.352.5</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE LPe1205A 8Gb Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>8Gb</td>
			<td>12.60a4</td>
			<td>2.10X6</td>
			<td>12.6.284.0</td>
			<td>12.6.302.0</td>
		</tr>
		<tr>
			<td>HPE 16Gb LPe1605 Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>16Gb</td>
			<td>12.6.275.12</td>
			<td>12.6.275.12</td>
			<td>12.6.275.7</td>
			<td>12.6.271.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="707f07cb4d404d119f2788d168e17586" version="d18989e4262848e688d75fee7c7172aa" lucid_version="a43.win.x64@2.40_02-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p><p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.</p><p>Added driver and option to enable SmartRAID SW RAID support for direct attached SATA and NVMe drives.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the fan runs at a higher than expected speed after upgrading the firmware of HPE Smart Array E208i or E408i to version 3.0.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.38_10-30-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices.  This option would only be used for PCIe Adapters that support his level of bifurcation. <p>Added support to increase the maximum amount of system memory to 8TB.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the server may encounter an Uncorrectable Machine Check Exception (UMCE) with a Bank of 0x00000005 or an Uncorrectable PCI Express Error with status 0x00040000 or 0x00010000. These errors will result in either an unexpected reset of the server or the server becoming unresponsive (such as Blue Screen with Windows, Purple Screen with VMware, or Kernel Panic with Linux).  This revision of the System ROM includes the latest revision of AMD firmware which addresses this issue.  This issue is not unique to HPE servers.<p>Addressed a rare issue where the system may fail to boot after a warm reset.<p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.<p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bf3a285848ac4632b8eb3d00276b79b4" version="3b7a3d2719434e0abdc9438ebd3ca680" lucid_version="nicfwupg_bcm.linux_x64@2.27.6__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="2.27.6" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses an issue about lack of information under AHS log.</li>
	<li>This product addresses an RSOD issue which appeared intermittently during POST after having a warm reboot.</li>
	<li>This product addresses a modification on help string of Family Firmware Version.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.26.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects the wrong spare number while it was originally not the same as what was written on the label of package.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e54bd80d86eb48638f965cd122dd00a1" version="518561b6ed2a4860845f87fcb34eb25f" lucid_version="VO0400KEFJB_VO1200KEFJC_VO2000KEFJD_x64@HPK4(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="68498f6599c54afbbc323dc39761e931" version="cbf3b7bbbdd44bdc823667f19b4d8c65" lucid_version="i40en.vmware65@2020.09.14__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.09.14" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which PCI device information passing to intnetcli Command-Line Interface (Intel&reg; ESXCLI Plug-In Managing tool ).</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.12.20" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where VLAN tag traffic dropped problem.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c41c6d23d08b454ca2ee1c24f966683f" version="be183c1fa427445d94c448298aefd7d5" lucid_version="MB001000GWCBC_MB002000GWCBD_x64@HPG6(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a7b0a77ad412478f9ceb945592e1c7ab" version="1214929690b34642a3e2d23b205788ee" lucid_version="bnxt_roce.rhel7u8.x86_64@218.0.7.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="218.0.7.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product now supports rdma-core v29(rdma user space application)</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="216.0.88.3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product corrects an issue which RoCE bond is not getting created automatically after system reboot</li>
	<li>This product corrects an issue which errors/performance may degrades after hot plug operation is performed</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f1e144df7ff3445292cda5ea1ed9d30c" version="b754509b00854600952fa928c0f76e08" lucid_version="MB002000JWFVN_MB004000JWFVP_x64@HPD3(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f7ead10dcb9d4e3b81c19da679b23ce2" version="5f0fea338d4c448ead6b351c9cb76f97" lucid_version="VK000480GWSXF_VK000960GWSXH_VK001920GWSXK_ESXi@HPG2(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eca7d77c8ba84ffe9014dfb5c3b6ee15" version="b4e5832486774e46bead24a86561c640" lucid_version="EH000900JWCPN_EH000600JWCPL_EH000300JWCPK_x64@HPD6(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update improves performance for random read workloads with delays between reads.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a6351a56dbe64b13b1076909ea7de13e" version="11fc7846ce694bff8c0a8309c3b41ce6" lucid_version="ixgben.vmware65@2020.09.14__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.09.14" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which notification from Link Partner when executed Link Flow Control settings.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.12.20" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects a recursion termination condition so that recursion correctly ends in the case of PCIe link down.<br />
This product addresses an issue where the ixgben driver has high CPU overhead when an SFP+ module is absent.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5ac3ee90b2184fa9828f960cd9d17840" version="3231804b5e184f74a40d707bfd8b7a44" lucid_version="EG000600JWJNP_EG001200JWJNQ_x64@HPD3(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8c8abb08e5a24556bd3dc3dfd7b5528b" version="1dc592b4cd674e16b740b2b2068edf42" lucid_version="qla2xxx.driver.esxi65.zip_rt@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 2.1.101.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 2.1.101.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e3c28d7e84d2418a888d50f48b760538" version="5cef0589ea3d4592954cf710966f0216" lucid_version="MB2000JFEML_MB4000JFEMN_x64@HPD6(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.</li>
	<li>The firmware also includes emergency power off improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (F)" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.</li>
	<li>The firmware also includes emergency power off improvements.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dd64dbafe6064086a1f60841a460f8b0" version="adc9ee2cc1df4db187d5224df9c5b239" lucid_version="bnxtnd.w2k19@218.0.32.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="218.0.32.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue where an system are freeze and reboot when system recovering after non-fatal error.</li>
	<li>This product correct an issue which fixes BSOD observed after updating the inbox driver on Windows 2019.</li>
	<li>This product correct an issue which fixes VF will not load on certain Virtual OS when Windows is host OS.&nbsp;</li>
	<li>This product correct an issue which fixes user mode RDMA blue screen of death (BSoD) caused by an IRP SystemBuffer access race condition</li>
	<li>This product corrects a Windows Stop Error blue screen of death (BSoD) seen when uninstalling the NDIS driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="216.0.143.3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which live firmware upgrade fails when run on both interfaces of the adapter simultaneously.</li>
	<li>This product corrects a timeout issue which configures network connection.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ddd8d308b4884fcca8742e3dd4152801" version="b420e9557eb245d8be878dad4bfc1da3" lucid_version="brcmfcoe.driver.esxi65.zip_rt@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1278.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.12.01 (b)" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1278.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<table>
	<tbody>
		<tr>
			<td>
			<p>Fixed the following:</p>

			<ul>
				<li>Purple Screen of Death(PSOD) at random intervals on HPE FlexFabric 20Gb 2-port 650FLB Adapter</li>
				<li>Link down after 1000 times port down and up iterations on switch.</li>
				<li>Detaching is not completing because lpfc_do_work_event can&#39;t exit.</li>
				<li>Slab memory use after free causing memory leak.</li>
				<li>Small Computer Sytem Interface(SCSI) command is used after done call.</li>
				<li>Target reset does not report original status</li>
			</ul>

			<ul>
				<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
			</ul>

			<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex&nbsp;XE-102 Based&nbsp;Network Adapters May Experience Link Down Due Toa&nbsp;Firmware Issue&quot; at the following&nbsp;link:</p>

			<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></p>
			</td>
		</tr>
		<tr>
			<td>&nbsp;</td>
		</tr>
	</tbody>
</table>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3e859f26085e4c19bd96948c814343e5" version="b7f64a9dbeff4d4292bcdafa0e2b4dfc" lucid_version="brcmnvmefc.driver.esxi70.zip_bl@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.8.329.0</p>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b2f966fef439400c8d3f8bcc5b3de93f" version="5f2fba0cb9af4d64a01d4c3d061c7866" lucid_version="u22.win.x64@2.90_11-27-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.90_11-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode: 0x000000E2 (CPUID 506E3). This Intel microcode patch provide mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-8696 and CVE-2020-8698. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381. These issues are not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.88_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9).<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381 and INTEL-SA-00389. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9). These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3f857d7b01734aa494f8146516002d2e" version="f12ce7d5927c40098d1350b8bc390d2b" lucid_version="Shenandoah@52.16.3-3913-rev1__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="52.16.3-3913" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="52.16.3-3913" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d1422347af3f4f888596c242a7fdb7a6" version="48b08e042e66490ba1807d71a2c1917a" lucid_version="HPE-CNA_FC-hpeqlgc-enablement@6.0.0.0-16__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="6.0.0.0-16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the kit to version 6.0.0.0-16</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.0.0.0-13" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the kit to version 6.0.0.0-13</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="568141f535e3461e90494d5ac58c3991" version="baf64209b7b64769add010e5281acfc1" lucid_version="MK000480GWCEV_MK000960GWCFA_MK001920GWCFB_ESXi@HPG3(F)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="028a309bf839487ca2355a0eed9d368b" version="4bc70c2144b342688bb197912df80aae" lucid_version="Gen10_NVMe_Backplane_PIC.win.x64@1.20(D)__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.20" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.20 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">The following support was added in version 1.20(B). No new features were added in version 1.20(C).</p>

<ul>
	<li style="margin-left: 0in; margin-right: 0in;">Added support for the HPE ProLiant XL270d Gen10 Server</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Firmware Package version 1.20(C) addressed the following issue:</p>

<ul>
	<li>When using OneView, attempts to upgrade firmware from version 1.18 to 1.20 failed.</li>
</ul>

<p style="margin-left:0in; margin-right:0in">Note: If the target device was previously updated to firmware version 1.20, it is not necessary to apply firmware update 1.20(C).</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eafab624995d485096ba1119b617b464" version="4410078eacad40a4acceca8299e4d26e" lucid_version="netxtreme2.sles15@7.14.76-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="7.14.76-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 15 Service Pack 2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue obtain Medium Dependent Interface(MDI) and Medium Dependent Interface Crossover (MDIX) information when execution ethtool tools</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.14.70-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses an issue where the driver Precision Time Protocol (PTP) is not working due to timestamp problem.</li>
	<li>This product addresses an issue where the Firmware installation failure when enabling secure boot under SUSE Linux Enterprise Server 15 SP2.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="26d6bb7ca1354a5998790d5fa42f5aa8" version="2d03bf73d124449591b65448d69d064d" lucid_version="iavf.rhel8@4.0.2-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.0.2-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>&nbsp;</p>

<ul>
	<li>This product now supports Red Hat Enterprise Linux 8 update 2 and Red Hat Enterprise Linux 8 update 3</li>
	<li>This product now supports the following servers:</li>
</ul>

<p style="margin-left:80px">&nbsp;HPE Superdome Flex 280 &nbsp;<br />
&nbsp;HPE Superdome Flex Server &nbsp;<br />
&nbsp;HPE Superdome Flex 2&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.9.5-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="77f2ff3d7ebf4999a5ec47887c09ecdf" version="a70df140a87a4729bf2d79df32ade2a3" lucid_version="MZPLJ1T6HBJR-000_MZPLJ3T2HBJR-000_MZPLJ6T_x64@4H3Q(B)-rev1__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4H3Q" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>*REMOVED* - Version 4H3Q(B) is NO LONGER AVAILABLE for download. Working version EPK74H3Q supporting full firmware version&nbsp; is now available from the following OS-specific URLs:</p>

<p>VMware: EPK74H3Q Firmware For VMware Operating Systems, https://www.hpe.com/global/swpublishing/MTX-51e52e05d02c4fdc8de04369ac</p>

<p>Windows: EPK74H3Q Firmware for Windows Operating Systems, https://www.hpe.com/global/swpublishing/MTX-17f6773477584f40934ba719f2</p>

<p>Linux: EPK74H3Q Firmware for Linux Operating Systems, https://www.hpe.com/global/swpublishing/MTX-956b407dbe4a42fc97c065e86a</p>

<p>Version EPK74H3Q will be available soon in Service Pack for ProLiant. For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us. This x64 Smart Component provides firmware for the following drive models: MZPLJ1T6HBJR-000, MZPLJ3T2HBJR-000 and MZPLJ6T4HALA-000</p>

<p>Working version EPK74H3Q resolves the following issue:</p>

<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4H3Q (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0d1bdabb9bd2412a9e8131f41d12a1c0" version="a5266c0b5d9142f4bb7eb3649b8300d4" lucid_version="VK000240GWCFD_VK000480GWCFE_VK000960GWCFF_ESXi@HPG3(F)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5230830842514ef8a52b0b19a00fb203" version="1fe9919da8234720accc28522b08cd41" lucid_version="ixgbevf_bl.rhel7@4.9.3-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9.3-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7, Updates 8 and 9.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue seen when enabling SRIOV, where the VFs have the same, duplicated MAC address.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.6.2-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="03a1d5d1c9c84f2b9c715674a729ac00" version="7e60f2b336af4051a229f6e72805328e" lucid_version="MB012000GWTFE_MB014000GWTFF_x64@HPG7(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG7" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG7" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware revision improves low-temperature performance and Error Correction Code (ECC) error recording for some commands.&nbsp;</li>
	<li>It also improves internal logging capabilities for failure analysis.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9d59a3d1e4634bdbbc3b067cb8dad588" version="d3e6dd33c77f4eeab871710c674fa622" lucid_version="be2iscsi_bl.w2k12r2@12.0.1171.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1171.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0c319cd0bae843d891d1e9696a4b873b" version="25b9b7f7ff224440bf576de9bf7af015" lucid_version="VK007680GWSXN_x64@HPG2(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0edaaf6685e5406d9f15af585063acb1" version="f52e007016ef420ab3f2755c688a470f" lucid_version="bnxt_roce.sles15sp1@218.0.7.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="218.0.7.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product now supports rdma-core v29(rdma user space application)</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="216.0.88.3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now disables loading RoCE driver on VFs when Link Aggregation is enabled</li>
	<li>This product now supports rdma-core v22&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue which RoCE bond is not getting created automatically after system reboot</li>
	<li>This product corrects an issue which errors/performance may degrades after hot plug operation is performed</li>
	<li>This product corrects an issue which HPSUM selects driver for SUSE Linux Enterprise Server 15 while SPP deployment running with SUSE Linux Enterprise Server 15 Service Pack 1 platform.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8dc1af4f4f75416590a7ddb9bd07a92c" version="455a9b8a38064383984f9cbbf2f0b1ff" lucid_version="ixgben.vmware70@2020.05.29__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.05.29" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4cc24985bf9c485084dcadb54a29cb28" version="cb560129b67c420e86fee00842829af2" lucid_version="VK000480GWSXF_VK000960GWSXH_VK001920GWSXK_x64@HPG2(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d60ce0b82db54a2e881c0e0bf9e229a2" version="4757bbff9d4840f29fc2f52f1011e70a" lucid_version="mlnx_mft.sles15sp2.x86_64.rpm@4.16__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.15" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="882bb8e4707345cbb8f1e7ba0901abee" version="e8bfc60088a744dca5cc45f89ccfd0e6" lucid_version="qlbb.rhel7.x86_64@8.55.5.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="8.55.5.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7 update 9</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue where the driver fails to load in NPAR mode when RoCE Data Center Quantized Congestion Notification (DCQCN) is enabled.</li>
	<li>This product corrects an issue ethernet data rate limiting unable on VFs.</li>
	<li>This product addresses a system crash seen when injecting a fw_assert on a NIC PF.</li>
	<li>This product addresses a system crash seen when limiting number of MSI-X interrupt vectors as requested for VFs</li>
	<li>This product addresses a system crash seen when unloading and reloading the RoCE driver only.</li>
	<li>This product addresses a system crash seen running burnin and iperf stress in Red Hat Enterprise Linux 7 update 9 environment</li>
	<li>This product addresses a system crash seen during multiple reboots of virtual machines using VFs and RDMA.</li>
	<li>This product addresses a the connection recover failed with heavy traffic</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.50.25.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 7 Update 8</li>
	<li>This product now adds PCIe Advanced Error Recovery (AER) support</li>
	<li>This product now supports RoCE bonding mode</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue which system crash after unloading and reloading only roce driver</li>
	<li>This product corrects an issue which VF RDMA system crash in overnight reboot test on multiple VMs</li>
	<li>This product corrects an issue which VMs crash randomly upon advanced property disable/enable with Max VFs enumerated on all PFs</li>
	<li>This product corrects an issue which iSCSI BFS system fails to reboot if one port is down and reboot is attempted</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bf47b80cbb5e498dbf61a3acfee47afb" version="7ae9b65b8d1b44749c5910226b8f1041" lucid_version="ixn.w2k12_r2@3.14.214.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="3.14.214.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.14.132.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="40aca5b1425544eabf3dc630ea9b775f" version="0d11d09152ad4a06b45bf01cc7cf774b" lucid_version="emulex.fc.fw.esxi70_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1" dir="LTR" style="width:935px">
	<tbody>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 81E 8Gb Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 82E 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 84E 8Gb Quad Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1000E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1000E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E Quad Port 16Gb Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp; have separate components to update fibre channel and converged network adapters.&nbsp;This is a fibre channel&nbsp;update component.</p>

<p><strong>Contains:</strong></p>

<p>32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>16/32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>16 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>8 Gb HBA Standup firmware 2.10X6<br />
8 Gb standup universal boot image 12.60a4(12.6.302.0 BIOS, 12.6.284.0 UEFI)</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ee7c0fad5ff040dabc594be75871d841" version="03f10bf622574025b711b1e94d94eee1" lucid_version="be2.w2k19@12.0.1195.0(C)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1195.0" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1195.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ff5a3639b5c744a8ac2e4611ce9482ea" version="35ead8ed7ee543bd8817968fdaa8afcc" lucid_version="u32.linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b8b6b31789ce4119a48876ba4b89c81f" version="579f55d77b1c4028bfa4f0740cc41b2d" lucid_version="U48.fwpkg@2.20_10-27-2020__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.20_10-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.</p>

<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>

<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.</p>

<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.&nbsp; These issues are not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.18_06-24-2020" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode for Intel Pentium processors which provides mitigations for security vulnerabilities documented as CVE-2020-0543 as well as CVE-2020-0548 and CVE-2020-0549. These security vulnerabilities are documented in Intel Security Advisories INTEL-SA-00320 and INTEL-SA-00329. These issues are not unique to HPE servers. This update does not impact systems using Intel Xeon based processors.</p>

<p>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.</p>

<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f5ab6808fff6474c8daabc965dddfa7b" version="f421af36cd6242e4875db001fde51cdb" lucid_version="esxi70-smx-provider-sw-bundle-sc@2020.04.01(A)__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.04.01" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add new supported servers</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.04.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support for VMware ESXi 7.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="13b837d640ac455ba223e985cd1fb165" version="6c6386c9563140a6abd4fb15ea9c3b14" lucid_version="P95.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a08198f75ae64d5f81f313aee3e10a81" version="d173272a9cc245e4861876ba2d4b0cd5" lucid_version="nicfwupg_intel_open.vmware@3.15.8__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="3.15.8" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports VMware vSphere 7.0 U1.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.14.6" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="text-align:left">This product now supports the following network adapters:</p>

<ul style="list-style-type:square">
	<li>Intel X710-DA2 Ethernet 10Gb 2-port SFP+ OCP3 Adapter for HPE</li>
	<li>Intel X710-DA2 Ethernet 10Gb 2-port SFP+ Adapter for HPE&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0d61334622ba44aeb0c163514d9f57b9" version="b5119cc9c731423694fa8dea6b0e59de" lucid_version="MB004000GWKGV_x64@HPG1(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="549939a4e5cb4543b7385d514127ff29" version="c26e66b87b8b4e5580b1d31372b7802a" lucid_version="mlnx_mft.rhel8u3.x86_64.rpm@4.16__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="121737c377d94d3aa35bfe198f1f6e1f" version="5e3c3d9560eb435db75018fb576fd4b1" lucid_version="mlnx_mft.sles12sp5.x86_64.rpm@4.16__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.15" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4e50152f0d024f97a52057a7a5220f5a" version="20faa990cd3941e6afea0adbcf728cd2" lucid_version="MB8000GFECR_ESXi@HPG6(F)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d3e8a053234f49d9a3735931f34c77c7" version="3ea62106cd964f79b06e0b520f8e5302" lucid_version="U43.Linux@2.20_10-27-2020-rev1__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.20_10-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>Addressed an issue where the &quot;Minimum Processor Idle Power Package C-State&quot; RBSU option was missing.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.20_10-27-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="09b4bcb98476436f9711a4ef6ff6b585" version="848ac9a3be704676a208fa362299e7b6" lucid_version="EK0800JVYPN_EO1600JVYPP_MK0800JVYPQ_MO1600JVY_ESXi@HPD7(C)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us" style="color: blue; text-decoration: none;">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us</a>.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (B)" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us" style="color: blue; text-decoration: none;">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us</a>.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="75bc856a96a1425a954558bdb79908f8" version="306238ef8ca64e59bf1ba7e044349f33" lucid_version="VK000480GWSXF_VK000960GWSXH_VK001920GWSXK_x64@HPG2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="192b893f37784f3bb19222ae8b1fcb3a" version="3bf27299241d443f9c6788ae5c27b415" lucid_version="emulex.cna.fw.esxi65_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">Updated CNA (XE100 series) firmware</p>

<table border="1" cellpadding="1" cellspacing="1" style="width:800px">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Firmware</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 10Gb 2-port 556FLR-T Adapter</td>
			<td>10Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</td>
			<td>10Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE CN1200E Dual Port Converged Network Adapter</td>
			<td>20Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;CN1200E-T Dual Port Adapter</td>
			<td>20Gb</td>
			<td>12.0.1336.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01 (b)" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">Updated CNA (XE100 series) firmware</p>

<p dir="LTR"><strong>Firmware</strong></p>

<p><strong>Contains:</strong></p>

<p>CNA (XE100 series) firmware 12.0.1280.5</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<p>UEFI:</p>

<ul>
	<li>HPE FlexFabric 20Gb 2-port 650FLB Adapter and HPE FlexFabric 20Gb 2-port 650M Adapter&nbsp;does not complete&nbsp;to create boot source on 2nd port</li>
</ul>

<p>Firmware:</p>

<ul>
	<li>Light Emiiting Diode(LED) is in&nbsp;invalid state when disable the port under Unified Extensible Firmware Interface (UEFI)</li>
	<li>Duplicate Entries found in firmware report under NIC details for few adaptors.</li>
	<li>Full adapter name is not displayed for HPE FlexFabric 20Gb 2-port 650M Adapter&nbsp;in some Rom Based Setup Utility (RBSU).</li>
	<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
</ul>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f1e3dc0362445eba42c38fd34e5d638" version="b1e30f32e2a7409289a8cfad4582fdd4" lucid_version="MM1000JEFRB_MM2000JEFRC_ESXi@HPD8(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="G" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (F)" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9ae794893ab74650b932b0d43d0328bd" version="117b0672d7ef4c5bb0eca02886b299f8" lucid_version="nicfwupg_qlflq_open.linux_x64@1.10.8__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.10.8" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supported NPAR enabling option.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product contains support PLDM firmware upgrade base improvements.</li>
	<li>This product addresses an overheat issue on the network adapters as below,</li>
</ul>

<p style="margin-left:80px">HPE Ethernet 10Gb 2-port BaseT QL41132HLRJ Adapter<br />
HPE Ethernet 10Gb 2-port BaseT QL41132HQRJ OCP3 Adapter</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.9.10" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue of inconsistent LED behavior while linking up with different speed.</li>
	<li>This product corrects an issue about failing to restore the factory default value by pressing F7.</li>
	<li>This product addresses an issue where driver doesn&rsquo;t load upon booting up by correct memory relocation.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1f91b74faf084255b33a9e102dcf221d" version="029dae74586643ab87759aa367b7ab68" lucid_version="U45.Linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Added a new BIOS/Platform Configuration (RBSU) option to Advanced PCIe Device Configuration called PCIe Switch MMIO Configuration.  This option addresses a virtualization issue caused by different interpretations of the PCIe specification by disabling PCIE Switch MMIO Configuration.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d026cab87ecf46f4a70676c4643d63f0" version="9a2c87630a4344e8a8e989cf0929b500" lucid_version="MK000800KWWFE_MK001600KWWFF_MK003200KWWFH_x64@HPK3(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2c10c37c94934b028d1c460ce9f457fb" version="c6b29241292145d8af4d872005ebf538" lucid_version="NVMe_Backplane_PIC.vmware@8.4(D)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="8.4" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added ESXi 6.7 OS support</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.4 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul style="list-style-type: square;">
	<li>Updated to support Service Pack for ProLiant version 2017.07.0</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<strong>Note:</strong>&nbsp;If&nbsp;version 8.4 was previously installed, then it is not necessary to upgrade to version 8.4 (C).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ef9e3c99746c4ae380ca5d0cac6d2b97" version="2ad68ad9536546799b2eb7866b8f3fda" lucid_version="MB6000GEQUT_MB8000GEQUU_ESXi@HPGB(H)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGB" revision="H" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</li>
	<li>Online firmware update fails when drives are connected behind AHCI controller.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGB (G)" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.Â  This issue was only found during supplier ongoing reliability testing.</li>
	<li>Online firmware update fails when drives are connected behind AHCI controller.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ff420d2a518645bca112d4ae29440c26" version="e8ee583b088a4fc2bdbbb9f9b11e9844" lucid_version="MK000400KWDUK_VK000480KWDUE_MK000800KWDUL_VK00_x64@HPK4(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="29d3ee50608a4989be087dbfc8603ca4" version="809a3c7991a24748a7fdf353ff041a0f" lucid_version="MB6000JVYZD_MB4000JVYZC_x64@HPD4(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="48c9c127d8e84c96aa3d591f450ace21" version="556182e6fc1246258154795ae211f65c" lucid_version="ql_iscsiuio_bl.sles15sp1@2.11.5.13-3(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.11.5.13-3" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product has&nbsp;been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.11.5.13-3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cd64600f655f440ba11117463945fc63" version="5a57dfdd382a47d3875c013ccaed6a28" lucid_version="MB2000JFEPA_MB4000JFEPB_x64@HPD5(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7821f460e2f3488c95e92c25e76c9d75" version="0940cb49a3fb403088543376cba34a99" lucid_version="HP-CNA-FC-Broadcom-Enablement.rhel7.x86_64@12.0.1339.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1339.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version: 12.0.1339.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1264.0 (b)" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version: 12.0.1264.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<table>
	<tbody>
		<tr>
			<td>
			<ul>
				<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
			</ul>
			&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></td>
		</tr>
	</tbody>
</table>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f2d480bbb5d747efac90df2828bbca07" version="5a2a7a841e5a49b0a721dbfb7f8c830c" lucid_version="VK003840GWSXL_ESXi@HPG2(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3c5ca1f7884d46278989b90e474b83e1" version="4f883aa682bb47339ad67b59fd19c789" lucid_version="MB006000JWKGN_x64@HPD1(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6a439b96c74c406881767d161dad104f" version="c89bc23a0932455cb9b4fb596f35184a" lucid_version="MB4000GEQNH_MB6000GEQNK_ESXi@HPGB(H)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGB" revision="H" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.</li>
	<li>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGB (G)" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.Â  This issue was found during supplier ongoing reliability testing.</li>
	<li>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d3eb22b830d045a89e85774c90558992" version="7fd8d315345a4b08bebcef9f59a5f856" lucid_version="MK0960GECQK_x64@HPG3(J)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="J" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (I)" revision="I" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="facf75b5c7944efda90a1807afad2c8a" version="b8065b615fcd4c5a874cce9cb0e00eaa" lucid_version="emulex.fc.fw.win.x64_bl@2021.02.01__sc-windows-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This Firmware package contains following firmware versions:</p>

<p>&nbsp;</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE 16Gb LPe1605 Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>16Gb</td>
			<td>12.8.352.12</td>
			<td>12.8.352.12</td>
			<td>12.8.352.10</td>
			<td>12.8.352.5</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE LPe1205A 8Gb Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>8Gb</td>
			<td>12.60a4</td>
			<td>2.10X6</td>
			<td>12.6.284.0</td>
			<td>12.6.302.0</td>
		</tr>
		<tr>
			<td>HPE 16Gb LPe1605 Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>16Gb</td>
			<td>12.6.275.12</td>
			<td>12.6.275.12</td>
			<td>12.6.275.7</td>
			<td>12.6.271.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="005a4115369b4776b7144bbda87ad6ef" version="ea7a93c6f547464f90e626017eaa05a0" lucid_version="aep_ddrt_dimm@1.2.0.5435(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.2.0.5435" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.</p>

<p>This product contains mainly performance improvements.</p>

<p>This product now supports Red Hat Enterprise Linux 8 and SUSE Linux Enterprise Server 12.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.0.5435" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6b8b85add4d84390b7e5eded3468099d" version="8563e1ecc11847a3bbb9cd0306aacd9c" lucid_version="lpfc.driver.esxi67.zip_rt@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.8.317.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.6.182.2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a32bfc6464f84b51997e9a09f493113b" version="2082a20ae1d34375af170caa6d819bdf" lucid_version="fibreutils_x86_64.linux.SLES@4.1-1(c)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.1-1" revision="c" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This package supports only SuSE Linux Enterprise Server(SLES) Distros</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1-1 (b)" revision="b" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This package supports only SuSE Linux Enterprise Server(SLES) Distros</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed adpater_info code to display correct Vendor name&nbsp;instead of Unknown</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8160f18bf46a4d4bb912b9b35f631323" version="1469d2085fc94851823b8d651aa54866" lucid_version="EG1800JEHMD_x64@HPD6(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f76235dc1aee44f3804452ef8c8047d0" version="baf7df28ec8347b5a7487700763c6c94" lucid_version="netxtreme2_bl.sles15@7.14.76-1(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="7.14.76-1" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 15 SP2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue where the driver fails to load in NPAR mode when RoCE Data Center Quantized Congestion Notification (DCQCN) is enabled.<br />
This product addresses a system crash seen when unloading and reloading the RoCE driver only.<br />
This product addresses a system crash seen during multiple reboots of virtual machines using VFs and RDMA.<br />
This product addresses a system crash seen when injecting a fw_assert on a NIC PF.<br />
This product corrects an issue where a system fails to shutdown after reboots in iSCSI BFS.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.14.63.1-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers correct an issue where iSCSI target discovery fails to complete when booting from SAN or a local HD.</p>

<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1cadb74f384743de9dfa8d9d6bc9f7b5" version="3286086eb5b748aab45a24e76f2f7cd2" lucid_version="MB006000GWJRR_MB008000GWJRT_ESXi@HPG4(C)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b2fc632eddf5428382301f3ae1e37ede" version="6d705878a3a947d280f46f8f18dd968c" lucid_version="qlogic_storport_x64.w2k16_bl@9.4.2.20__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="9.4.2.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version&nbsp;9.4.2.20</p>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.4.1.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 9.4.1.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>Memory dumps were not generated during a crash dump in a boot from SAN environment</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3592f88084a649b687bec6ded2891596" version="a768a0ab68394b3fbef3a71f84548e43" lucid_version="P95.vmware@2.80_10-16-2020__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3f2f70c223354bc6b59b77123faa8545" version="13ad04578e4943cd90239bc9b2a83576" lucid_version="EH000900JWCPN_EH000600JWCPL_EH000300JWCPK_x64@HPD6(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update improves performance for random read workloads with delays between reads.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f7d7f54393d44f66845199e26d4e5900" version="f4b68e57d74d443b9bab8161fd4bb2b9" lucid_version="EH000900JWHPK_EH000600JWHPH_ESXi@HPD4(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7f41af98f1f247caa57376b98f09238f" version="ac0e3422c58d4ba5a50c9968747cbae9" lucid_version="MO001600KWZQP_MO003200KWZQQ_x64@HPK5-rev1__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="30eade866ed942baab65d2fd9ed8adf2" version="7256f9c1f56a4269bd6a06120f80d1c2" lucid_version="bnxtnd.w2k16@218.0.32.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="218.0.32.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an Wake-on-LAN (WoL) function unavailable.</li>
	<li>This product correct an issue which fixes VF will not load on certain Virtual OS when Windows is host OS.&nbsp;</li>
	<li>This product correct an issue which fixes user mode RDMA blue screen of death (BSoD) caused by an IRP SystemBuffer access race condition</li>
	<li>This product corrects a Windows Stop Error blue screen of death (BSoD) seen when uninstalling the NDIS driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="216.0.143.3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which live firmware upgrade fails when run on both interfaces of the adapter simultaneously.</li>
	<li>This product corrects a timeout issue which configures network connection.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b708791c2556438caa9e3c26486663c3" version="a6849ac36d1c4fd49ad6989aa8203192" lucid_version="HBA_H221_Linux@15.10.10.00(C)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="15.10.10.00" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Improved Integration with Smart Update Manager.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="15.10.10.00 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixes an issue where the appropriate FW version for the Host Bus Adapter (HBA) Stockade (H2xx) driver will not install when using the Service Pack ProLiant (SPP)</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="835ec029c284401691cf43baf128212e" version="eb0d3436f001466ebb9060a03e3f4b00" lucid_version="MB6000GEXXV_x64@HPG2(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7a0e2103ab3d449ea173c873ce94c871" version="f86788fdfc8b43e6805bf3232834c3b2" lucid_version="ssaducli.linux.x64@5.10.44.0__pubsw-linux_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.10.44.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Adding support&nbsp;to the HPE&nbsp;SR Gen10 Plus&nbsp;Controllers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="00635454b21f4153bb8707b2c8200e57" version="79c35b5ded0e45f2b4e41b15b4df5393" lucid_version="brcmfcoe.driver.esxi67.zip_bl@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Updated to Driver version 12.0.1278.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8f7bfcc1686841199a7eebcfc658f164" version="502ccc8e30da4e79a43e0e0c4dd2fb4c" lucid_version="MLNX_Ethernet_Only_NIC_FW_package.esxi67@1.0.5__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.5" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5044 :</strong></p>

<p>&nbsp; &nbsp;779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)<br />
&nbsp; &nbsp;779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.29.1016:</strong></p>

<p>&nbsp; &nbsp;817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.29.1016:</strong><br />
&nbsp; &nbsp;817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</p>

<p><strong>Firmware for the following device is updated to 16.29.1016:</strong></p>

<p>&nbsp; &nbsp;874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</p>

<p><strong>New features and changes in version 14.29.1016:</strong></p>

<p style="margin-left:40px">Added support for the following features:</p>

<ul>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>cq_overrun counter: This counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p><strong>New features and changes in version 16.29.1016:</strong></p>

<p style="margin-left:40px">Added support for following features:</p>

<ul>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Steering DP hash flow groups.</li>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>PCIe Rx modifications to prevent the adapter cards from disappearing from the system.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
	<li>cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>[Beta]&nbsp;Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>ixes submitted in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) &nbsp;NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that caused&nbsp;packets to drop due to header size issues and/or failing checks. The issue was caused due to a Linux issue that caused&nbsp;VFs to set the wrong header size value in wqe_inline_header_mode input.</li>
	<li>When MKEY_BY_NAME was&nbsp;enabled by NVCONFIG and a large number of VFs were configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>&nbsp;An issue that caused&nbsp;the device to go to dead IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.&nbsp;</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>&nbsp;An issue that prevented&nbsp;VXLAN packets with svlan/ cvlan tag from being matched.</li>
	<li>The&nbsp;eth_wqe_too_small counter to count&nbsp;ODP page used to fail.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>An issue that resulted in low performance after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.</li>
	<li>An issue that caused&nbsp;the device to go to dead IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5044 :</strong></p>

<p>&nbsp; &nbsp;779799-B21 (HP Ethernet 10G 2-port 546FLR-SFP+ Adapter)<br />
&nbsp; &nbsp;779793-B21 (HP Ethernet 10G 2-port 546SFP+ Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.27.4000:</strong></p>

<p>&nbsp; &nbsp;817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.27.4000:</strong><br />
&nbsp; &nbsp;817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</p>

<p><strong>Firmware for the following device is updated to 16.27.2008:</strong></p>

<p>&nbsp; &nbsp;874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</p>

<p><strong>New features and changes in version 16.27.2008:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New features and changes in version 14.27.4000:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction:
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes submitted in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.27.4000:</strong></p>

<ul>
	<li>The sent packet hung while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>The completions (CQ)completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.&nbsp;</li>
	<li>The fragmented IP packets were dropped.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7b0103ddf3b44215b7f92f0c298c391f" version="d1e1b5187a8249d182dde1fea87ae71c" lucid_version="nmlx4_en.vmware70@2020.11.11__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.11.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New Features in version 3.19.70.1:</strong></p>

<ul>
	<li>Resolved an issue that caused the network adapter traffic to stop.</li>
	<li>Fixed an internal multicast loopback issue that broke LACP(Link Aggregation Control Protocol) bonding protocol.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7615104752d44337b92336bf27de44e5" version="37fcd43484ab45d19000cd43bb21670d" lucid_version="P99.vmware@2.80_10-16-2020__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled (TXT is disabled by default). This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="effc199f67764de3b570f964be1aa0ce" version="8fbafa0a10a047d394d2bc8943d12be5" lucid_version="IEGen10.win.x64@0.2.2.0-rev1__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="0.2.2.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None  <P><B>Firmware Dependencies:</B></P>None  <P><B>Problems Fixed:</B></P>Addressed an extremely rare issue where Processor or Memory temperature reporting may not be collected properly by the platform and the system fans may be running faster than expected. This issue has been seen occasionally after a server reboot and is typically corrected with a subsequent server reboot. <P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0.2.2.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None  <P><B>Firmware Dependencies:</B></P>None  <P><B>Problems Fixed:</B></P>Addressed an extremely rare issue where Processor or Memory temperature reporting may not be collected properly by the platform and the system fans may be running faster than expected. This issue has been seen occasionally after a server reboot and is typically corrected with a subsequent server reboot. <P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="497dff17dd524ba3a936f4d2ccd99da8" version="2bc5099c415c4f15bd7821c42484224c" lucid_version="brcmfcoe.sles12.x86_64@12.0.1342.0__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1342.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0 (c)" revision="c" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1259.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<table>
	<tbody>
		<tr>
			<td>
			<ul>
				<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
			</ul>
			&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></td>
		</tr>
	</tbody>
</table>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a4fb8dc02faf478a85519ccf77530c6a" version="dd9de34e9fc74b60b7f9f8b3eb159b60" lucid_version="VK000480GWTHA_VK000960GWTHB_VK001920GWTHC_ESXi@HPG2__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This maintenance FW release addresses a rare corner case COMRESET issue at warm boot, and to address an early EOL behavior under certain use cases.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cfe4c5a213fb4be397a8b588efd29cc1" version="84707e9a8dee4410a2df2a215d25d354" lucid_version="MB006000GWKGR_ESXi@HPG1(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="03d55b6f216746b88ddef311b0a8c1f9" version="6f64d75d2ca14f9290180170b3144842" lucid_version="nicfwupg_qlnx2.vmware@1.28.6__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.28.6" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue that platform would be randomly waked up by WOL packet.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.27.11" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product improves the functionality for the MBI firmware update.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects the display problem of the adapter name under RBSU.</li>
	<li>This products corrects some issues about the thermal reporting and temperature threadshold control of the adapter.</li>
	<li>This product addresses an error when the MBI firmware update is executed in the secure boot mode.</li>
	<li>This product addresses an issue where unexpected UMCE(Uncorrectable Machine Check Exception) appeared when powering on the system with NPAR(Network Partitioning) enabled.<br />
	&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="438f6bb803b440feb816d6663cff3bca" version="96d984a607d74a19a2c9198c5de16fde" lucid_version="hpsa.rhel7.x86_64.rpm@3.4.20-202__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.4.20-202" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Red Hat Enterprise Linux 7 Update 9</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.4.20-191" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Red Hat Enterprise Linux 7 Update 8</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="667c48761fdd439199126de11a3666a8" version="2e2783b7dd934f80b12f1232639b4028" lucid_version="MicroServerGEN10PlusSPS.Linux@05.01.04.208__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.208" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.113" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This image contains the latest Intel Server Platform Services (SPS) Firmware which contains mitigations for a variety of security vulnerabilities. The following vulnerabilities have been addressed in this SPS release: CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="08fe2c1296bd42698b5f247147246702" version="7fb61d29633941e1a5bd455dd24b8141" lucid_version="ixn_bl.w2k12r2@3.14.214.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="3.14.214.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation libraries, ixtmsg.dll, nicco5.dll, and nicinitx.dll.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.14.132.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="35aedb12078f4cf798d76b05b4d2ddf4" version="39d8b7fed6af4be9938e37f96ea4f69d" lucid_version="isut-esxi.esxi65@2021.04.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.12.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the&nbsp;<a href="http://www.hpe.com/info/sut-docs">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="02a1f5d0f0e244c0b4c2ace636d0f60b" version="5d58c74bb54a4c4c9d120e89541bfede" lucid_version="MB004000GWKGV_x64@HPG1(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dcf87aae93de4d649fef4547bffe751a" version="5844766b4e254c54915f507af5f883d1" lucid_version="MLNX_VPI_CX6_HCA_MFT_FW_package.x64@1.0.6__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.6" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 20.29.1016:</strong></p>

<p>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21<br />
&nbsp;</p>

<p><strong>New Features and Changes in Version 20.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.</li>
	<li>To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.</li>
	<li>Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.</li>
	<li>Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.29.1016:</strong></p>

<ol>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
</ol>

<ol start="7">
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ol>

<ul>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 20.27.6008:</strong></p>

<p>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21<br />
&nbsp;</p>

<p><strong>New Features and Changes in Version 20.27.6008:</strong></p>

<ul>
	<li>The following are the minimal software/firmware versions that support PAM4 link speeds when&nbsp;connected using Mellanox NIC to Mellanox Switch and Mellanox NIC to 3rd Party Switches:
	<ul>
		<li>Mellanox Onyx: 3.9.0830-038</li>
		<li>ConnectX-6: 20.27.2008*<br />
		*Note: NICs with this firmware version support Mellanox-to-Mellanox connectivity with PAM4 link&nbsp;speeds.</li>
	</ul>
	</li>
	<li>Added support for the following features:
	<ul>
		<li>Enabled KP4RS FEC on Active Fiber cable up to 30m.</li>
		<li>FDR protocol.</li>
		<li>Enabled updating End-to-End (E2E) credit packets instantly.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>There are no new fixes in firmware version 20.27.6008.</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dd9af2922ef944c1aae83a2243605be9" version="a94d8cbb2ab44854b1ac6b49efda50cb" lucid_version="U26.win.x64@2.66_07-19-2019__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.66_07-19-2019" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where the system may experience a machine check after updating to the latest System ROM which contained a fix for an Intel TSX (Transactional Synchronizations Extensions) sightings. The previous microcode was first introduced in the v2.62 System ROM. This issue only impacts systems configured with Intel Xeon&reg; D-1500 processors. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.64_04-04-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c64a84fd2c1c48b694ff9c49365c2913" version="de2c0f0e28124d849c6fa5c0acf33c6f" lucid_version="matrox.G200eH.win2016.x64@9.15.1.224__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="9.15.1.224" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for random screen corruption when changing resolution that could occur with driver versions 9.15.1.184 and 9.15.1.218.</li>
	<li>Fix for a display freeze that could occur when running the Windows Display Diagnostics tool (dispdiag.exe).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.15.1.218" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Windows Server 2019.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d2fcdefd57524f44b8d7ad99311fad8f" version="55da9a4a6bc6480c91a9c6a1e1f2508c" lucid_version="qlfle3_bl.vmware70@2021.04.19__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.19" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports VMware vSphere 7.0 U1.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses a PSOD involving an encapsulated header.<br />
This product addresses a PSOD seen during traffic scheduling.<br />
This product corrects an incorrect MTU value displayed by the ESXCLI tool.<br />
This product addresses a PSOD issue seen during Storage vMotion operation.<br />
This product addresses PSODs seen during discovery timeout, transmit scheduling, and LUN reset scenarios.<br />
This product addresses a PSOD seen on systems operating in a complicated VLAN environment.<br />
This product addresses a PSOD seen during critical packet drop scenarios.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.06.01" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c9a4232d8cb349049f544bcc6d02e97f" version="acb0c12a65bf4eaeb205f29d44602465" lucid_version="Hawksbill@52.16.3-3913-rev2__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="52.16.3-3913" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="52.16.3-3913" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Build</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="60d50a2d8e934d7ba3009af9a701d8ce" version="9ca2bd8dad8e46778dff651f0cc246f7" lucid_version="esxi70-utility-sw-bundle-sc@2021.04.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Includes an updated the Smart Storage Administrator CLI&nbsp;(SSACLI).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.12.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Supports VMware ESXi 7.0 and ESXi 7.0 U1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="82d1b2ac21094989a9b2118ea6829df2" version="6346a49b6d6d47d5b92b9abdf3c77c58" lucid_version="MB8000GFECR_x64@HPG6(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2b0745f5d1b9423aa88e57ad4cdfbe00" version="8a8fad376d14438d9b68b11b3033cfa5" lucid_version="MB002000JWFVN_MB004000JWFVP_x64@HPD3(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bd87491089a64d5ebd7c9035cfb17538" version="571589cf4c44486e96a3a87cb54fae04" lucid_version="hp-health_rhel8_x86_64@10.9.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="10.9.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>TBD</li>
	<li>TBD</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.9.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial support for Red Hat Enterprise Linux 8 Server</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="25afa565c5cd4e359629eee44baf7e64" version="3ef8f32dd69646faae9db1d772be38be" lucid_version="U39.linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3207ab7da97d4b129737d7c53c2ebb76" version="2e8ea97a00bd4ee8b429f9ee9929c349" lucid_version="VO007680JWCNK_VO015300JWCNL_x64@HPD8(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (B)" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e528a2af212b4bb09bfd3cb54b985653" version="c2a8b10573d94e60b40263da5437619a" lucid_version="Apollo_4200_Gen10_Plus.Lin@0.37__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="0.37" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="957b79699cf847b3bc804b96d1108938" version="5a3d510de27c488f9c61fd2eb26770ef" lucid_version="icelake.win.x64@10.1.18661.8255__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.1.18661.8255" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Removed device &quot;VMD Registers &ndash; 28C0&quot;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="09f59b2aef5e4eee80432b69a5878137" version="d93cd897307649f39c8b95f8a1a80dd5" lucid_version="be2_bl.w2k12r2@12.0.1195.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1195.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a1d749637b0b455e9a43d66fc6eed023" version="5579b68a75314dedb93232f769f9f788" lucid_version="MZPLJ1T6HBJR-000_MZPLJ3T2HBJR-000_MZPLJ6T_ESXi@4H3Q(B)-rev1__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4H3Q" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">*REMOVED* - Version 4H3Q(B) is NO LONGER AVAILABLE for download. Working version EPK74H3Q supporting full firmware version&nbsp; is now available from the following OS-specific URLs:</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">VMware: EPK74H3Q Firmware For VMware Operating Systems, https://www.hpe.com/global/swpublishing/MTX-51e52e05d02c4fdc8de04369ac</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Windows: EPK74H3Q Firmware for Windows Operating Systems, https://www.hpe.com/global/swpublishing/MTX-17f6773477584f40934ba719f2</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Linux: EPK74H3Q Firmware for Linux Operating Systems, https://www.hpe.com/global/swpublishing/MTX-956b407dbe4a42fc97c065e86a</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Version EPK74H3Q will be available soon in Service Pack for ProLiant. For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us. This x64 Smart Component provides firmware for the following drive models: MZPLJ1T6HBJR-000, MZPLJ3T2HBJR-000 and MZPLJ6T4HALA-000</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Working version EPK74H3Q resolves the following issue:</p>

<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4H3Q (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="939eb4c97d9745fe9b103a023bb5c6ab" version="edb6f39dfca7446691685b8b8eba4e5b" lucid_version="VO001920KWZQR_VO003840KWZQT_ESXi@HPK5-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="da89b89bd1534fddb60af7c195cb4d11" version="e60e366f57c145abbced01dc920e9ede" lucid_version="EH0300JDYTH_EH0450JDYTK_EH0600JDYTL_x64@HPD6(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c154697a46644c47b9724ee0f9b7eaa4" version="2c8b05ea902743ac927a92c715bbd21a" lucid_version="elxnet.vmware67@2020.09.14__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.09.14" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.03.09" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue vmnic flapping caused the network connectivity to be affected.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ae7662457b594bb08733bceba6635c72" version="855cefdaddeb4aa2afdda593ee4c82fb" lucid_version="MB012000GWDFE_x64@HPG2(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue during unaligned write commands, only found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f3dab1f723a42fab0fcd6264fd8e85f" version="9eddb46d5476453c8d6f27e7c7c113f2" lucid_version="P86.Win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bca5397d7ba147ddbb0eb4fee4d4d567" version="10e4bcc6599743a0ad11e967ed4907bb" lucid_version="qlogic.online.fw.lin.x64_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE 81Q 8Gb PCIe Fibre Channel Host Bus Adapter &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE 82Q 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE 84Q 8Gb Quad Port&nbsp;Fibre Channel Host Bus Adapter&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE SN1000Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
		<tr>
			<td>HPE SN1000Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1600Q 32Gb Single Port&nbsp;Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1600Q 32Gb Dual Port&nbsp;Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>02.04.07</td>
			<td>09.06.02</td>
			<td>7.11</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1610Q 32Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>02.04.07</td>
			<td>09.06.02</td>
			<td>7.11</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for 8 Gb,&nbsp;16 Gb and 32 Gb&nbsp;products.</p>

<ul>
	<li>8Gb&nbsp;Fibre Channel Host Bus Adapter:
	<ul>
		<li>Package 3.82.00</li>
		<li>Firmware 8.08.207</li>
		<li>UEFI 7.00</li>
		<li>BIOS 3.56</li>
	</ul>
	</li>
	<li>16Gb&nbsp;Fibre Channel Host Bus Adapter:
	<ul>
		<li>Package 6.03.00</li>
		<li>Firmware 8.08.231</li>
		<li>UEFI 7.02</li>
		<li>BIOS 3.43</li>
	</ul>
	</li>
	<li>16Gb/32Gb&nbsp;Fibre Channel Host Bus Adapter:&nbsp;
	<ul>
		<li>Package 1.74.07</li>
		<li>Firmware 9.03.00</li>
		<li>UEFI 7.02</li>
		<li>BIOS 3.64</li>
	</ul>
	</li>
	<li>32Gb&nbsp;Fibre Channel Host Bus Adapter:&nbsp;&nbsp;
	<ul>
		<li>Package 02.03.06</li>
		<li>Firmware 09.04.01</li>
		<li>UEFI 7.08</li>
		<li>BIOS 0.0</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d2428e35050d42c7ba121ca5de5ea63c" version="326493ca0b1849e991d2bbfc607dcda3" lucid_version="EG1800JEMDB_x64@HPD5(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="14bdb24247e844e783ad854d474aa245" version="e52c3704acdd42d6ac74c6b5b128a1a4" lucid_version="lpfc.driver.esxi70.zip_rt@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.8.329.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.6.228.4</p>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bc640709bf9a4728898e83ba80473c0a" version="66e56cbe9bfe433b808e07d33976e1b3" lucid_version="MT001600KWHAC_MT003200KWHAD_MT006400KWHAE_ESXi@HPS1(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPS1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPS1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f66d2f40fe3b49a2ae22ce155e429f5c" version="fab01c35bd3c46e5bb4fc5754b7c261b" lucid_version="MB008000JWWQP_MB006000JWWQN_x64@HPD2(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for RHEL 8.2.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8881b9f92866499daac317541d2299ed" version="4063ecb214f240cfb6a3a5dbd7c8b2cc" lucid_version="EG1800JEMDB_ESXi@HPD5(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="521144c543434ae9b4777bf076b798c5" version="9b78901c4d1543e782a0fa93a04b63bc" lucid_version="Tinker_FW_Lin@1.0.14.1052__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.14.1052" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to the RDE-Alerts feature</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.14.1047" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Firmware Smart Component release for HPE Gen10+ Boot Controller</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8f50751a2a4c4c6eac4753b883c9d78b" version="262c2c428cc447eebcaf0976442857d2" lucid_version="bnxt.rhel7.x86_64@1.10.2-218.0.67.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.10.2-218.0.67.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 7 update 9</li>
	<li>This product now supports PAM4 speeds information in&nbsp;ethtool tools&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses an issue where system crashed on doing driver unload load in loop when running broadcast traffic</li>
	<li>This product addresses an issue where bnxt_en module crashes with NULL pointer deference before ifup(bring up network interface)</li>
	<li>This product addresses an issue where kernel panic after PCIe AER(Advanced Error Reporting) device recovery successful</li>
	<li>This product addresses an issue where bnxt_en crashes with NULL pointer dereference when enabling SRIOV</li>
	<li>This product correct an error where ethtool -S tx_bytes and rx_bytes counter values far exceed actual values</li>
	<li>This product correct an error message when querying hwmon temperature on VF via sysfs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.10.1-216.0.169.4" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 7 Update 8</li>
	<li>This product now sets Maximum Transmission Unit(MTU) default value from firmware returned value</li>
	<li>This product now not support user establishing connections using RDMA communication manager(CM) when Priority-based Flow Control (PFC) configured VLAN ID is 0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue which offload is not happening on bond(vf and virtio) interface after the fail over with VF as the active slave</li>
	<li>This product corrects an issue which driver loading failed on kdump kernel.</li>
	<li>This product corrects an issue which RoCE driver causes input&ndash;output memory management unit(IOMMU) warnings</li>
	<li>This product corrects an issue which RoCE Link Aggregation (RoCE LAG) when Maximum Transmission Unit(MTU) was changed.</li>
	<li>This product corrects an issue which Link up failed after resuming from hibernation</li>
	<li>This product corrects an issue which Virtual Function RoCE driver causes Virtual Machine to be rebooted</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b5d6bf00c2934921ba03955fbaab210d" version="07f43cb1b1034888acccbe5d64f7756f" lucid_version="U13.Linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c07f99c2b0d248348543770e8f33efd1" version="c0a0fdffc7e04965a04cd2721223395e" lucid_version="qla2xxx.driver.esxi70.zip_rt@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 4.1.22.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 4.1.9.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d9b51eadf7e440fc88f26963aec59690" version="56640a6e9f804447a67cb1eedd5d39a4" lucid_version="MicroServerGEN10PlusSPS.Win.x64@05.01.04.208__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.208" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.113" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This image contains the latest Intel Server Platform Services (SPS) Firmware which contains mitigations for a variety of security vulnerabilities. The following vulnerabilities have been addressed in this SPS release: CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="88920b6128524213bc79e665d9b3a53b" version="d21ea45df7174660b13687dc9b581f05" lucid_version="evbd.win64@7.13.196.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="7.13.196.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue where the vSwitch unavailable to assign on WS2012R2.</li>
	<li>This product correct an issue which fixes One time system crash seen while uninstalling NDIS driver</li>
	<li>This product addresses an issue where an SR-IOV virtual function can&#39;t to start normaly.&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.13.187.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which Blue Screen of Death （BSOD）that thread&#39;s saved floating-point state is invalid when executed Network stress.&nbsp;</li>
	<li>This product correct an issue which failed to generate Internet Small Computer System Interface(iSCSI) Crash dump in Secure Boot enabled.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8c5c6a0f19974bc4868c84a832f1b780" version="d1989fededf14742a3977e71fe62ea9e" lucid_version="elxnet.vmware65@2020.09.14__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.09.14" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.03.09" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue vmnic flapping caused the network connectivity to be affected.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="489fcd07381047728f0d8307f128b6be" version="6031795a2e384fbc94adde80cc775cc8" lucid_version="HPE-CNA-FC-Emulex-Enablement.sles12.x86_64@12.8.352.11__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.272.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 12.6.272.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a5a34b70caa4482380a015cc4a6e9c97" version="f4d3a30cbe304a819a06cd5176ce1fe2" lucid_version="emulex.fc.fw.esxi65_bl@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This Firmware package contains following firmware versions:</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE 16Gb LPe1605 Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>16Gb</td>
			<td>12.8.352.12</td>
			<td>12.8.352.12</td>
			<td>12.8.352.10</td>
			<td>12.8.352.5</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE LPe1205A 8Gb Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>8Gb</td>
			<td>12.60a4</td>
			<td>2.10X6</td>
			<td>12.6.284.0</td>
			<td>12.6.302.0</td>
		</tr>
		<tr>
			<td>HPE 16Gb LPe1605 Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>16Gb</td>
			<td>12.6.275.12</td>
			<td>12.6.275.12</td>
			<td>12.6.275.7</td>
			<td>12.6.271.0</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="193fefc836ff47bc98df145955f3145a" version="74b8992a809c47cd8be5f9fa46e89e47" lucid_version="MB2000JFEML_MB4000JFEMN_ESXi@HPD6(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="H" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.</li>
	<li>The firmware also includes emergency power off improvements.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (G)" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.</li>
	<li>The firmware also includes emergency power off improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0fb6a42a8b224caba8a145e0ac696d52" version="f07847af517e4aebb7662432470c0222" lucid_version="U34.linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5b139cd72d0b4c89818f276c3a1dce8c" version="e941f1092f934ef9ae42bad70c9e5801" lucid_version="MZXL5800HBHQ-000H3_MZXL51T6HBJR-000H3_MZXL53T2_x64@MPK73H5Q-rev1__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="MPK73H5Q" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="MPK73H5Q" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting .</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8da11b65fc4a442eb7c1c3ce3ad367bb" version="3d1364bbad764ba684bbf773e9aca55e" lucid_version="MK000480GWCEV_MK000960GWCFA_MK001920GWCFB_x64@HPG3(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3de1667723914ad89f6c44c12d89171b" version="0ecf0c72db94499c82c18762aefa5a19" lucid_version="mlnxcx3.w2k12r2@5.35.12978.0(B)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.35.12978.0" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.35.12978.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed an issue where the link speed of an IPoIB adapter was the actual speed and not the official speed (i.e. 54.3GB/s instead of 56 GB/s).<br />
Fixed an issue where firmware burning failed on servers with Connectx-3 and Connectx-4 devices.<br />
Fixed an issue were Mellanox counters in Perfmon did not work over HPE devices.<br />
Fixed an issue that caused the installation process to hang while checking if the RDSH service is installed.<br />
Fixed an issue where a SR-IOV team failure was caused by an unsuccessful adapter parameters update.<br />
Fixed a crash in the driver properties dialog in the case where more than 8 teaming ports were defined.<br />
Fixed an issue which reported a false error for successful netsh tcp settings via performance tuning.<br />
Fixed a crash which could occur during virtual function initialization.<br />
Deactivated the RDMA statistics counters query for vPorts for which RDMA is not enabled.<br />
Fixed the issue which caused the failure of the powershell command Get_MLNXNetAdapterSettings and the command Get_MLNXNetAdapterFlowControlSettings on servers with Connectx3/Pro and ConnectX4/LX devices.<br />
Fixed a crash which could occur during driver initialization.<br />
Fixed an issue that generated and sent an erroneous message to the Windows event log when using firmware 2.36.5000 whenever &quot;Mellanox WinOF Bus Counters&quot; was selected in Perfmon.<br />
Fixed an issue that occasionally caused system-hang when TCP offload parameters were updated dynamically while SR-IOV was enabled.<br />
Fixed an issue that occasionally caused system-hang upon bus driver disabling, when the encapsulation parameters were updated dynamically while SR-IOV was enabled.<br />
Fixed an issue where the virtual function RDMA was not functional when vSwitch was attached to port 2. Now RDMA over VF is supported only when the vSwitch is attached to port 1.<br />
Fixed an issue which caused the driver to hang during installation process.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aba50894270544dcaa9bf4eb0a273b8c" version="9755702c7b1b4b6bae4d73212fc39cc9" lucid_version="U15.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="52d86414c1094be5a91709cfda5fa592" version="e51b215c9ab3435685e5ead8d2dd6d9c" lucid_version="Gen10Plus_UBM2_Backplane_PIC@1.16__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="63b5acd6b69146b7aacdd66e3c7732d6" version="53a437585e814589a15f7d22f2fcaf9c" lucid_version="Apollo_4200_Gen10.Lin@1.78(A)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.78" revision="A" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added HPE Smart Array P824i-p controller&nbsp;support</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.78" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for the HPE Apollo 4200 Gen10 Server</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5f7dae044b3b4d97823b1cfc69305837" version="e5e4d0dc4f5e4d879e27269e435db546" lucid_version="nicfwupg_qlnx2.linux_x64@2.28.6__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="2.28.6" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue that platform would be randomly waked up by WOL packet.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.27.50" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where the Firmware installation failure when enabling secure boot under SUSE Linux Enterprise Server 15 SP2.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cb2be7d18951448db0daf6ce3cff2a1c" version="3c9f436e6008438b8854a4ecf00eae9c" lucid_version="EG1800JFHMH_x64@HPD7(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dc41774861a945f28d388059e656b2ca" version="be413fccc81745d583654fcc0ddcaaf3" lucid_version="nicfwpkg_intel_e810_cq2ocp@2.24__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="2.24" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial version</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a2c850b33a31462c8693efedafbdd8b9" version="7761c1b3fae845228e5a11aacf6408a0" lucid_version="nicfwupg_qlflq.linux_x64@1.10.10__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.10.10" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains support PLDM firmware upgrade base improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.9.8" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects the abnormal disconnection of iLO web page while performing under Shared Networking on Flexible-LOM.</li>
	<li>This product addresses an issue where the HPE Ethernet 10/25Gb 2-port 622FLR-SFP28 adapter and &nbsp;HPE Ethernet 10/25Gb 2-port 621SFP28 Adapter UMCE (Uncorrectable Machine Check Exception) was followed by Unrecoverable I/O error, Uncorrectable PCI express error on Server and one of the ports suddenly no longer can send or receive traffic.</li>
	<li>This product addresses an issue where driver doesn&rsquo;t load upon booting up by correct memory relocation.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b2ba8bbc89f8475a9e824abb19fcc091" version="113df3e43450407bbf5bb64a491d3b23" lucid_version="VK000240GWSRQ_VK000480GWSRR_VK000960GWSRT_x64@HPG4(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>PrefetchClear logic error on Write CMD.</li>
	<li>ICRC Data Integrity improvement</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3f71b29f23c14fcb8f1f4cc9ac53400c" version="5022dcd5d6504b74a776027b358405fe" lucid_version="MB008000JWRTD_x64@HPD1(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="74593c8509e24398998a42d78a910462" version="0e5e497eea4b4368ab6727513935b3c6" lucid_version="a47.fwpkg@2.40_02-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support for AMD EPYC 7003 processors.<p>Added support for Direct Liquid Cooling solution.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.<p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>HPE ProLiant XL675d Gen10Plus CPLD version 0F<p>HPE Apollo 6500 Gen10 Plus Chassis CPLD version 0909<P><B>Problems Fixed:</B></P>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="C9279" version="bb7012258996420cb71c7f833a304bfc" lucid_version="nicfwupg_bcm.win64@5.2.4.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.2.4.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product addresses an issue about lack of information under AHS log.</li>
	<li>This product addresses an RSOD issue which appeared intermittently during POST after having a warm reboot.</li>
	<li>This product addresses a modification on help string of Family Firmware Version.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.2.3.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects the wrong spare number while it was originally not the same as what was written on the label of package.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="47e104da8d1247009422e246e7ae204a" version="d7b50fb0b8a3400b9b25b995852e8633" lucid_version="ixt.w2k19@4.1.197.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.197.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial version</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="058a033acd864749bc51a480576695e0" version="63108f5b31a34e41bf083831da5b9550" lucid_version="Trumpkin.16gb.fwpkg@1.04(A)__fwpkg-nvdimm_en"/>
      <revision_history>
        <revision>
          <version value="1.04" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial relaese.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.04" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial relaese.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9cc198d5db9a4dc58d7191dc280dcc88" version="cee7101386584a9b95021d96063ef93a" lucid_version="i40e.sles12.x86_64@2.13.10-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.13.10-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product supports new feature called software DCB(Data Center Bridging) which allows using DCB without firmware LLDP(Link Layer Discovery Protocol) agent being turned on.</li>
	<li>This product supports new feature which allows user to specify VLAN(Virtual Local Area Network) field and add it to flow director via ethtool</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses an issue where server hungs after loading XDP(eXpress Data Path) program in case of LLDP(Link Layer Discovery Protocol) agent disabled&nbsp;</li>
	<li>This product addresses an issue where it is not possible to change MAC(Media Access Control) address on VF(Virtual Function) from VM(Virtual Machine) when VF is in trusted mode</li>
	<li>This product addresses an issue where it cannot create VF(Virtual Function) VLAN(Virtual Local Area Network) interface inside a namespace&nbsp;</li>
	<li>This product addresses an issue where system crash during removing driver when VSI(VIrtual Station Interface) is in reset recovery mode</li>
	<li>This product addresses an issue where VF(Virtual Function) receives unicast packets from other VF</li>
	<li>This product addresses an issue where using Intel nvmupdate utility never ending update</li>
	<li>Thips product addresses an issue where kernel crash in vf driver(iavf) reset when pf driver(i40e) is removing</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.11.27-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</li>
	<li>This product corrects an issue which querying DCB configuration data failed on Intel Carslville controller if driver probe or set &nbsp;at 2.5/5G speed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2ce3ac2092b94fa1b8631b7964992fb7" version="526df3e1023b4f539e3eadd8dd8a4c14" lucid_version="VO007680JWCNK_VO015300JWCNL_x64@HPD8(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (B)" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4ac92b6d48fb46ccad998db868b37deb" version="bc7c672fa5b049139b43eed635d3c80d" lucid_version="lsi_sas2.w2012_R2.x64@2.68.64.1(B)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="2.68.64.1" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:.1in"><strong>Change implemented in version 2.68.64.1(B)</strong>:</p>

<ul>
	<li>Updated to support Service Pack for ProLiant version 2017.07.0.<br />
	<strong>Note:</strong> If driver version 2.68.64.1 was previously installed, then it is not necessary to upgrade to version 2.68.64.1(B).</li>
</ul>

<p style="margin-left:.1in"><strong>Enhancements/New Features implemented in version 2.68.64.1</strong>:</p>

<ul>
	<li>Added support for Windows 8.1 and Windows Server 2012R2 to the build scripts.</li>
	<li>Add build support for new Windows Event Logging.</li>
	<li>Add support for automatic selection of the default driver build parameters file during the build</li>
</ul>

<p style="margin-left:1.0in">&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.68.64.2 (A)" revision="A" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for:</p>

<ul>
	<li>Microsoft Windows Server 2016 - Server Core and Server with a Desktop.</li>
</ul>

<p><strong>Note:</strong> Revised component package. No change to driver functionality resulting from the change. If system has previously updated to driver version 2.68.64.2, then it is not necessary to update to 2.68.64.2(A).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3f4d9eceae63421389745abdf06f001a" version="a3b51156c8c64053b6fbb31c0524ebce" lucid_version="FWPKG-P31348-B21@20.29.1016__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.29.1016" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New Features and Changes in Version 20.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.</li>
	<li>To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.</li>
	<li>Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.</li>
	<li>Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.29.1016:</strong></p>

<ol>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ol>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5a6728d6569a49b58900b480fe0325b7" version="0dc867eb99334cfba3a3a8a17cdc85d9" lucid_version="U20.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="42eb0b14ee764418a766256ac492f5b9" version="16db44a089104cfb9cf6570d36545834" lucid_version="StorCLI.win@1.25.12.0__sc-windows_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.25.12.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Release For Snap4</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.24.9.0 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Improved integration with Smart Update Manager.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0b5ea35199d249309413cdf1ab404c23" version="a887105ee21c42b9863a6cbd4a4dca36" lucid_version="nicfwupg_intel_open.win64@5.2.4.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.2.4.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which fixes OROM downgrade failed from older version with exit code 6&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.2.3.5" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="text-align:left">This product now supports the following network adapters:</p>

<ul style="list-style-type:square">
	<li>Intel X710-DA2 Ethernet 10Gb 2-port SFP+ OCP3 Adapter for HPE</li>
	<li>Intel X710-DA2 Ethernet 10Gb 2-port SFP+ Adapter for HPE&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5f78fc3b4e0e4c3db7002c50957e782b" version="6d71ca35ea2d43468453f871ca0717a5" lucid_version="D2x00.fwsc.win_x64@0150(B)-rev1__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="0150" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fix is added in this version:-</strong></p>

<p>-Removed action over FAULT_SENSED bit due to incorrect algorithm.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0150 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fix is added in this version:-</strong></p>

<p>-Removed action over FAULT_SENSED bit due to incorrect algorithm.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ec5ba4f75ae340e39f8e129f646a9647" version="be56268f4f07454c962b50dc5b184194" lucid_version="MLNX_Open_Ethernet_NIC_MFT_FW_package.x64@1.0.4__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is&nbsp;updated to 14.29.1016:</strong></p>

<p>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)<br />
P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</p>

<p><strong>Firmware for the following devices is&nbsp;updated to 16.29.1016:</strong></p>

<p>P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)<br />
P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)<br />
P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)</p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<p><strong>New Feature and Changes in Version 14.29.1016 and 16.29.1016:</strong></p>

<ul style="list-style-type:square">
	<li>Ethernet wqe_too_small Mode: A per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p style="margin-left:40px">Added support for the following features:</p>

<ul style="list-style-type:square">
	<li>cq_overrun counter: The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>Enabled the capability to allow Virtual Functions to send Pause Frames packets. (Beta)</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
</ul>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<ul style="list-style-type:square">
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p style="margin-left:40px">Added support for the following features:</p>

<ul style="list-style-type:square">
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats:</li>
	<li>Responder Mini CQE With Flow Tag Layout.</li>
	<li>Responder Mini CQE With l3_l4_info Layout.</li>
	<li>Steering DP hash flow groups.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 14.29.1016 and 16.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that caused packets to drop due to header size issues and/or failing checks. This issue was caused due to a Linux issue that caused VFs to set the wrong header size value in wqe_inline_header_mode input.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) might take longer than when MKEY_BY_NAME was disabled.</li>
	<li>In rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that caused the eth_wqe_too_small counter to count ODP page faults.</li>
	<li>A low performance was observed after enabling the RoCE Accelerator capability.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is&nbsp;updated to 14.27.4000:</strong></p>

<p>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)<br />
P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</p>

<p><strong>Firmware for the following devices is&nbsp;updated to 16.27.2008:</strong></p>

<p>P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)<br />
P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)<br />
P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)</p>

<p><strong>New Feature and Changes in Version 12.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observerd while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0471b7afab434bd587f54eef07345610" version="47378b6d3e694a65a251bb2b4aca6ff4" lucid_version="neches.asr.win2012.x64@4.7.1.0-rev1__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="4.7.1.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed branding issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modified code to comply with de-branding requirements</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f10e85c0a8e4d0f99dcb8584f535fd3" version="a9d918d5114d49569f9ed7e81f515ebb" lucid_version="EH000900JWHPP_EH000600JWHPN_EH000300JWHPL_x64@HPD4(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7fae0e3a1408427d859a7147aca14a11" version="d6ee5259298e469584ecb1092196dca4" lucid_version="elxiscsi.vmware67@2020.09.14__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.09.14" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.03.09" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue ESXi lib naming convention in iscsi driver packages caused payload conflict for ESXi 6.7.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4ff3517aac1346d786660aa0bedadd20" version="3c462edc00ed4c188e0d227f7515575e" lucid_version="brcmfcoe.rhel7.x86_64_legacy@12.0.1342.0__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1342.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="83ce77cbc6db45d29c95de38716f222e" version="855f5f83866c4aedbd854eae9ffb65a7" lucid_version="MB014000JWUDB_x64@HPD2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="194ff765dcf14c3183bf0b90a60ddc0c" version="c9200f579fe44979b83963e97032fd51" lucid_version="mlnx_en_roce_mlx5.sles12sp5.x86_64.rpm@5.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.2:</strong></p>

<p><strong>For ConnectX-5 Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>CQE compression support for Rx multi-strides packets.</li>
		<li>Configuring QoS on a single QP or on a group of QPs.</li>
		<li>Encap/decap hardware offload of IPv4 traffic over MPLS-over-UDP. This can be used in networks with MPLS routers to achieve more efficient routing.</li>
		<li>Connection tracking rules on VFs to forward traffic from one VF to the other.</li>
		<li>Offloading sFlow sampling rules.</li>
	</ul>
	</li>
</ul>

<p><strong>For ConnectX-5 Adapters and ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>A locking mechanism to enable parallel insertion of rules into the software steering using the mlx5dv_dr API. The parallel insertion improves the insertion rate and takes place when adding Rx and Tx rules via the FDB domain.</li>
		<li>Option to match mlx5dv_dr API on Geneve tunnel using a dynamic flex parser. The option header consists of class, type, length and data. The parser should be configured using devx command, after which a rule can be created to match on parser ID and data.</li>
		<li>Geneve tunneling offload, including matching on extension header.</li>
		<li>Parallel insertion and deletion of offloaded rules using multiple&nbsp;OVS threads.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>[Beta] Modify GTP-U TEID. This support requires flex parser&nbsp;configuration.</li>
		<li>[Beta] Improved performance of OVS Connection Tracking flows by&nbsp;enabling the merge of the multi-table flow matches and actions into one joint flow.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters and above:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Transmitted packet timestamping accuracy can be improved when using a timestamp generated at the port level instead of a timestamp generated upon CQE creation. Tx port time-stamping better reflects the actual time of a packet&#39;s transmission. This feature is disabled by default. The feature can be enabled or disabled using the following command. ethtool --set-priv-flags tx_port_ts on / off.</li>
	<li>Offloading tunnel rules when the source interface is VF (in addition to uplink) in the Hypervisor.</li>
	<li>Using Mirroring Offload with Connection Tracking.</li>
	<li>ASO flow meter using the mlx5dv_dr API, which allows for monitoring the packet rate for specific flows. When a packet hits a flow that is connected to a flow meter, the rate of packets through this meter is evaluated, and the packet is marked with a color copied into one of the C registers, according to the current rate compared to the reference rate.</li>
	<li>ASO first hit using the mlx5dv_dr API, which allows for tracking rule hits by packets. When a packet hits a rule with the ASO first hit action, a flag is set indicating this event, and the original value of the flag is copied to one of the C registers.</li>
	<li>mlx5dv_dr API support for matching on a new field &quot;gtpu_first_ext_dw_0&quot;. This field enables packet filtering based on the GTP-U first extension header (first dword only). To enable parsing of tunnel GTP-U extension header, run the following command. ./cloud_fw_reset.py FLEX_PARSER_PROFILE_ENABLE=3.</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Lx Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>IPsec full offload support for extended sequence number, replay protection window and lifetime packet limit.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;All HCA&#39;s:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>New query GID API that allows for querying a single GID entry by its port and GID index, or querying for all GID tables of a specific device. This API works over ioctl instead of sysfs, which accelerates the querying process.</li>
		<li>Performing multi-host firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reload.</li>
		<li>[Alpha] Firmware live patching in the driver. Live patching updates the firmware without the need to perform firmware reset. However, it can only be applied in scenarios where the difference between the current and new firmware versions are minor, which is decided upon by the firmware itself.</li>
		<li>devlink tool for performing firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reloads the current firmware image from the flash in case no new firmware was pending. For further information, please refer to the the devlink man page.</li>
		<li>A resiliency mechanism for the driver to manually poll the command event queue (EQ) in case of a command timeout. In case the resiliency mechanism finds unhandled event queue entry (EQE) due to a lost interrupt, the driver will handle it, after which the command interface returns to a healthy state.</li>
		<li>Setting a sniffer private flag is deprecated and no longer required. In order to capture offloaded/RoCE traffic, tcpdump can now be run on the RDMA device.</li>
		<li>Added per-port reporters to devlink health to manage per-port health activities. Users can now access the devlink port reporters by specifying the port index in addition to the device devlink name through the devlink health commands API. This update was first introduced in iproute2 v5.8. As part of this feature, mlx5e Tx and Rx reporters are now redefined as devlink port reporters. For examples, please see devlink-health manpage</li>
		<li>Optimized memory consumption of memory registration in huge page systems. As an example, in a 2MB huge page system, 600 MB would be saved for 100 GB memory registration.</li>
		<li>mlx5dv API to modify the configured UDP source port for RoCE packets of a given RC/UC QP when QP is in RTS state.</li>
		<li>Accelerating Tx datapath by saving PCI bandwidth and CPU utilization. The savings are achieved by aggregating multiple packets into a single WQE. The feature is driven by xmit_more for certain traffic types, such as UDP.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.2:</strong></p>

<ul>
	<li>Clearing min_rate on all SR-IOV legacy VFs after setting min_rate to at least one of the VFs did not disable QoS min_rate.</li>
	<li>An empty /usr/src/mlnx-ofa_kernel/default is now no longer created.</li>
	<li>An issue where installing packages through a repository failed after generation of metapackages using --add-kernel-support. The failure occurred due to excessive and incorrect Obsolete headers in those metapackages.Enabled installation of mlnx-ofa_kernel package to /bin/python3 instead of / usr/bin/python3 on RHEL 8.x systems.</li>
	<li>All IPoIB offload packets were wrongly counted as rx_csum_complete. These packets are now identified as rx_csum_unnecessary packets.</li>
	<li>mlx5dv_dr_rule_destroy segmentation fault could happen in rare cases with multiple rules on the same matcher with a different number of actions. This could happen after reusing an already deleted rule memory with less actions.</li>
	<li>An issue of moving to SwitchDev mode after configuring DSCP (Differentiated Service Code Point).</li>
	<li>Global traffic class configuration did not take effect on DC QPs (Dynamically Connected Queue Pairs).</li>
	<li>ib_send_bw traffic frequently dropped to zero when RDMA CM was used, because of incorrect&nbsp;min_rnr_timer setting on the responder side. The min_rnr_timer setting is now aligned with the setting in non-RDMA CM cases.</li>
	<li>Traffic did not pass over VFs with VST QinQ feature is enabled.</li>
	<li>When traffic was sent over Geneve VLAN with Tx VLAN offload enabled and TSO (TCP Segmentation Offload)&nbsp;or Tx csum enabled, traffic could be dropped and not sent to the wire.</li>
	<li>An issue that caused the firmware to restart upon installing mlnxofed-dpdk-upstream-libs package manually.</li>
	<li>Bad utility paths in rdma-core &quot;dracut&quot; hooks on SLES systems, which used to result in the following errors when running &quot;dracut&quot; with the &quot;--add rdma&quot; option. dracut-install:
	<ul>
		<li>ERROR: installing &lsquo;/usr/libexec/mlx4-setup.sh&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/mlx4-setup.sh dracut-install: ERROR: installing &lsquo;/usr/libexec/rdma-set-sriov-vf&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/rdma-set-sriov-vf</li>
	</ul>
	</li>
	<li>Traffic class value was not updated in DCT when set via sysfs.</li>
	<li>A doorbell loss issue on AMD platforms with Secure Memory Encryption (SME).</li>
	<li>Registering memory using mlx5dv_devx_umem_reg while forking. Without this fix, applications which use fork() or similar syscalls while using a memory registered with umem_reg could hang due to incorrect physical page mapping. This fix requires setting the IBV_FORK_SAFE environment variable.</li>
	<li>When&nbsp;unbinding the device resulted in the following message being printed to the dmesg: &quot;failed to disable DC tracer&quot;</li>
	<li>Content of file /sys/class/net//statistics/ multicast might have been out of date and might have displayed values lower than the real values.</li>
	<li>ERSPAN (Encapsulated Remote SPAN) protocol was available only when turning off Tx checksum offload.</li>
	<li>A udev script issue which caused non-mellanox devices to be renamed.</li>
	<li>Missing representor statistics when using ifconfig.</li>
	<li>Fixed wrong value of skb mark of received packets on representors.</li>
	<li>An issue which caused second port representors to be named as first port representors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.1:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>The user can now set a packet pacing rate on the special queues that forward traffic from one physical port to the other.</li>
		<li>Connection Tracking (TC) offload on network interfaces that are in NIC mode, as opposed to SwitchDev mode. Note: This support is currently available for interfaces with physical functions only.</li>
		<li>Limiting SMP MADs on the wire using a Send window mechanism. This allows the user to keep track of the outstanding number of SMP MADs per-port, and allows for limiting this number to shape traffic when the pace of SMP MADs requires control.</li>
		<li>Direct Rule (DR) API support for sampling action to allow duplication and sampling of some ratio of the traffic. The API also allows to perform a set of different DR actions on the sampled traffic.</li>
	</ul>
	</li>
	<li>Enabled on-demand device memory sync to free cached memory.&nbsp;</li>
	<li>Simplified the sanity test that verified which systems must use python3 and not python2, so that when rebuilding the kernel packages using --add-kernel-support, the systems based on RHEL/CentOS 8 were detected.&nbsp;</li>
	<li>Added back rx_dct_connect counter that queries the number of received connection requests for the associated DCTs</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.1:</strong></p>

<ul>
	<li>Extended mlx5 recovery-flow delay on VF driver when PCI interface went down</li>
	<li>ibv_get_device_list returned only accessible devices.</li>
	<li>&ldquo;rpmbuild&rdquo; (that includes basic support for building RPM packages) was not installed by the install script on SLES15 SPx systems when trying to rebuild packages.</li>
	<li>AF_XDP was not functional.</li>
	<li>neohost-backend and neohost-sdk packages were not properly removed by the uninstallation procedure and might have required manual removal before re-installing or upgrading MLNX_OFED driver.</li>
	<li>During MLNX_OFED installation, warning messages related to modules iw_cxgb3 and iw_nes might have appeared in the log.</li>
	<li>Command timeouts occurred when the Hypervisor disabled the VF&#39;s PCI interface. This fix reduces the device removal time to 2 seconds.</li>
	<li>MLNX_OFED/MLNX_EN installer will no longer automatically remove the spdk package when installing the driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="88ebeea03a744545bfbd59b724e23e90" version="fefe02a88ece449d806f8a449d8f5a0d" lucid_version="Gen10_NVMe_Backplane_PIC.linux@1.20(E)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.20" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SUSE Linux Enterprise Server 15 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.20 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">The following support was added in version 1.20(C). No new features were added in version 1.20(D).</p>

<ul>
	<li style="margin-left: 0in; margin-right: 0in;">Added support for the HPE ProLiant XL270d Gen10 Server</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Firmware Package version 1.20(D) addressed the following issue:</p>

<ul>
	<li>When using OneView, attempts to upgrade firmware from version 1.18 to 1.20 failed.</li>
</ul>

<p style="margin-left:0in; margin-right:0in">Note: If the target device was previously updated to firmware version 1.20, it is not necessary to apply firmware update 1.20(D).</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b64e2e4187274c5798b3aa127c50ba6a" version="dd2a039afa014db0aaba522b79ef93cb" lucid_version="u43.fwpkg@2.20_10-27-2020-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.20_10-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>Addressed an issue where the &quot;Minimum Processor Idle Power Package C-State&quot; RBSU option was missing.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.20_10-27-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fc4022f2727541aca9a0c50b935a3b24" version="2c39c7e85bf4437792b2074c52c6bd1e" lucid_version="e1r.w2k16@12.16.3.1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.16.3.1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.15.184.7" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>

<p>This product add Wrapping and fix Support To Cometlake,and added thermal sensor support for fiber NIC.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which override and copy constructor to MSIX_AFFINITY_MANAGEMENT class to eliminate KW issues with double freeing memory.<br />
This product correct an issue which fixed e1r compile to exclude Nahum Icelake defines.<br />
This product correct an issue which fixed conversion of timestamp into 64bit value.<br />
This product correct an issue which fix for NDIS Miniport Kernel Pointer Leakage</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4893b899f6404bf4b119e3e3a55be5b2" version="558d89fb5c7745e0b072533baa1b1456" lucid_version="MB012000JWDFD_x64@HPD2(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue during unaligned write commands, found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue during unaligned write commands, found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ccbfcdbdc47644e7ab18a371d4af9d7a" version="8b00f222cb9745349d08269c71ac897c" lucid_version="U38.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="73ec3bde4c824e4abd7a12e09eb4bcb4" version="391aebf56c6b449280217cb067adb25e" lucid_version="EG000600JWJNP_EG001200JWJNQ_x64@HPD3(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added Support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="916fe10c0989454da7fed6ac8080c703" version="8c09efb1863c40f3ae6c0bd65a8968fb" lucid_version="EK000200GWEPD_EK000400GWEPE_EK000800GWEPF_EK00_x64@HPG3(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="87a7eb56c25b4c4c98ceb5ea24664524" version="ae89f359185b4983a222e880564755e2" lucid_version="Hightop@52.16.3-3913-rev2__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="52.16.3-3913" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="52.16.3-3913" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Build</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cc96bd351eff4426bf37f3da741a7623" version="7f784a4a975146e49b691647878f6949" lucid_version="MB004000GWKGV_ESXi@HPG1(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="67c1e7cc9a5f4a98b6e37ff05556aec1" version="228b5255801449f6a047211f91a3c05e" lucid_version="bnxt_roce.rhel8u2@218.0.7.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="218.0.7.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a215c8b0f11b453cbd6a752733ae590e" version="324f5f9946bd49479a1bb405eea898c0" lucid_version="Shenandoah_Storcli.win@7.1616.0.0__sc-windows_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="7.1616.0.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Supports maintaining&nbsp;and configuration of Gen10+ MegaRAID Controllers: MR416i-a, MR416i-p, MR216i-a, MR216i-p</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="911c76d50a064e62be53550825c8db4d" version="29efe2217ec34feaa600e7af0d932456" lucid_version="EG000300JWFVB_ESXi@HPD2(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4106b2f5d7c1411c95e94d52dff63df7" version="a597c6f939394ac9b3cc5e8ed515d49b" lucid_version="MM1000GFJTE_x64@HPG5(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d313ecbde1f54151bf42ad357e6b94ad" version="f19c9745130b4cc1aa3468994cb0ae2b" lucid_version="A40.Linux@2.44_10-29-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.44_10-29-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices. &nbsp;This option would only be used for PCIe Adapters that support his level of bifurcation.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system may hang during boot up after a warm reset from the OS.</p>

<p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.</p>

<p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.42_07-17-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option for DRAM Burst Refresh Mode to provide mitigation for TRRespass and Targeted Row Refresh exploits. This option should be configured to Disabled to mitigate the TRRespass vulnerability. Setting this option to Disabled may have a minimal impact to system performance. The default setting is Enabled.</p>

<p>Added a new BIOS/Platform Configuration (RBSU) option in the Minimum Processor Idle Power Core C-State setting for C1 State. This option allows for power savings during certain workloads without the performance impacts of C6 State.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where uncorrectable memory errors are seen when running memory intensive workloads with LRDIMMs.</p>

<p>Address an issue that could cause a slight degradation of performance.</p>

<p>Resolved an issue with NVMe hot add or removal which may result in an unrecoverable I/O error reported in the Integrated Management Log (IML).</p>

<p>Addressed an issue where the UEFI Shell command GetPciRom may not display information for PCI expansion device drivers.</p>

<p>Addressed an extremely intermittent issue with AMD Epyc 1st Gen processors that would cause a critical error and system reset.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7eb6e3adc2094748b6a18ae2e5daf1e0" version="44318fd5ae674b269a7ca5f826fc3af5" lucid_version="qlogic_windows_smartsan_enablement.x64@1.0.0.1(i)-rev1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.0.1" revision="i" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.1 (i)" revision="i" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="79178f63311141b49420306fd1de47d3" version="dd47c8e9f4644fc2bd05c2f4b0c1cd29" lucid_version="i40e.rhel8@2.13.10-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.13.10-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 8 update 2 and Red Hat Enterprise Linux 8 update 3</li>
	<li>This product supports new feature called software DCB(Data Center Bridging) which allows using DCB without firmware LLDP(Link Layer Discovery Protocol) agent being turned on.</li>
	<li>This product supports new feature which allows user to specify VLAN(Virtual Local Area Network) field and add it to flow director via ethtool</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses an issue where server hungs after loading XDP(eXpress Data Path) program in case of LLDP(Link Layer Discovery Protocol) agent disabled&nbsp;</li>
	<li>This product addresses an issue where it is not possible to change MAC(Media Access Control) address on VF(Virtual Function) from VM(Virtual Machine) when VF is in trusted mode</li>
	<li>This product addresses an issue where it cannot create VF(Virtual Function) VLAN(Virtual Local Area Network) interface inside a namespace&nbsp;</li>
	<li>This product addresses an issue where system crash during removing driver when VSI(VIrtual Station Interface) is in reset recovery mode</li>
	<li>This product addresses an issue where VF(Virtual Function) receives unicast packets from other VF</li>
	<li>This product addresses an issue where using Intel nvmupdate utility never ending update</li>
	<li>Thips product addresses an issue where kernel crash in vf driver(iavf) reset when pf driver(i40e) is removing</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.11.27-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS.</li>
	<li>This product corrects an issue which querying DCB configuration data failed on Intel Carslville controller if driver probe or set &nbsp;at 2.5/5G speed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="266dae77506e4f72bfe8d5ce5b7da6ff" version="f1feb21534d940fbae7a5300f1794584" lucid_version="vxn_bl.w2k19@2.1.191.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.1.191.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation library vxnmsg.dll.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.1.138.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="63976963938d4f79be04f7b652abb966" version="92a9354255ef43c9839e49db669af5e2" lucid_version="MB014000JWRTH_MB012000JWRTF_MB010000JWRTE_x64@HPD2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ff242e39c275472185612592300114ce" version="7f828e99d4614ad99fde22134e410c0c" lucid_version="qevbd.win64@8.55.5.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="8.55.5.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an Wake-on-LAN (WoL) function unavailable.</li>
	<li>This product correct high CPU usage with Virtual Machine Multiple Queues (VMMQ).</li>
	<li>This product addresses a BSOD seen when using the netsh utility to configure global RSS.</li>
	<li>This product correct an issue which fixes BSOD in case of NicSwitch and send NBL has vport id which exceeds max vports capability.</li>
	<li>This product addresses a Windows Stop Error (BSOD) seen where an SR-IOV virtual function to assign while installing driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.50.10.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which fixes the Virtual Function (VF) sleep duration on the channel while it waits for Physical Function(PF) response.</li>
	<li>This product correct an issue which System crashed when Single Root I/O Virtualization(SR-IOV) enabled on few partitions and disabled on few partitions using OneView.</li>
	<li>This product correct an issue which operating system boot failure after update Firmware to 08.50.27.</li>
	<li>This product correct an issue which System crashed is seen while upgrading drivers on enabled Network Partitioning (NPAR) and Single Root I/O Virtualization(SR-IOV) with enterprise data Center mode.&nbsp;</li>
	<li>This product correct an issue which Virtual Machines (VMs) crash randomly upon advanced property disable/enable with Max virtual functions (VFs) enumerated on all Physical Functions(PFs).</li>
	<li>This product correct an issue which System crashed seen while disabling Network Driver Interface Specification (NDIS) driver while running &nbsp;RoCEv2 IPv6 traffic on Management OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="199eba867d0c4e0892143a3378628d99" version="d5a07e119d6b45e5a0c9abffae50f4e0" lucid_version="MO0400KEFHN_MO0800KEFHP_MO1600KEFHQ_ESXi@HPK4(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b02d63095f7c44f5ba3d7deb6bb4021a" version="6c0173c9b8e447549f9a03f6b15b586f" lucid_version="MB8000JFECQ_ESXi@HPD7(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d7e21057ac6640f0b343d9d0d83a30a1" version="b042f267b9b1478b9cf8f4c8cb9a10be" lucid_version="MB6000GVYZB_MB4000GVYZA_x64@HPG4(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b0d92753c2304b2890afe0bb312c776b" version="aea77a32edbd4da78d457dfbe0c199d3" lucid_version="P99.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled (TXT is disabled by default). This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4c879b2de58c433090e3e0a088f41fb0" version="24a0de66235147298195d5e4250c46fa" lucid_version="u22.vmware@2.90_11-27-2020__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.90_11-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode: 0x000000E2 (CPUID 506E3). This Intel microcode patch provide mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-8696 and CVE-2020-8698. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381. These issues are not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.88_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9).<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381 and INTEL-SA-00389. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9). These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2bd1c3f2d559498081c13ef5a6c74bb4" version="1f30a28605ea456fb738777ccafb03c4" lucid_version="U48.Linux@2.20_10-27-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.20_10-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.</p>

<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>

<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.</p>

<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.&nbsp; These issues are not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.18_06-24-2020" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode for Intel Pentium processors which provides mitigations for security vulnerabilities documented as CVE-2020-0543 as well as CVE-2020-0548 and CVE-2020-0549. These security vulnerabilities are documented in Intel Security Advisories INTEL-SA-00320 and INTEL-SA-00329. These issues are not unique to HPE servers. This update does not impact systems using Intel Xeon based processors.</p>

<p>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.</p>

<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="32232f7880984b91885a4743fd2f886d" version="bd4ab65f4e8748828973811c632e4dcd" lucid_version="VK007680GWSXN_x64@HPG2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c4ff2ade728c42bfb931931df173daf9" version="51e015bbe6d84252a5b8affebd467024" lucid_version="SPSGen10.fwpkg@04.01.04.423-rev1__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="04.01.04.423" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="04.01.04.423" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ed4e13cf761c496aa2355b8c9f267dd3" version="8406d28aa2cf442aa067a3754e08c1e2" lucid_version="mlnxcx4.w2k16@2.60.23957.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.60.23957.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses a Windows Stop Error (BSOD) seen when running Mellanox NdStat Utility (mlx5cmd -ndstat) while ND connections was closing.</li>
	<li>This product corrects driver loading failures seen due to incorrect INF file.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40.22511.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ol>
	<li>The number of VMs is limited to 124 VMs with VMQ(Virtual Machine Queue) mode.</li>
	<li>The driver supports up to 200 vPorts in ConnectX-4 Lx and 254 vPorts in ConnectX-5 with SRIOV(Single Root I/O Virtualization).</li>
</ol>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ol>
	<li>This product correct an issue which caused memory corruption in case the OS provided continues memory across multiple pages that did not start with offset zero on aligned memory address.</li>
	<li>This product correct an issue that prevented the device from being updated with the new driver because the driver was already in the driver store.</li>
	<li>This product correct an issue which occasionally prevented the VF counters from being displayed correctly in perfmon.</li>
	<li>This product correct an issue which caused the driver to report zero link speeds supported when working with firmware older than 1x.18.0240.</li>
	<li>This product correct an issue which fixed a memory leak issue in error flow during driver initialization.</li>
</ol>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="91ee236bfbbc43019f9a1a0183e7fcbd" version="b57ca48a980f45e58d9055497c3a695d" lucid_version="MB6000GVYZB_MB4000GVYZA_x64@HPG4(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f94dec5c06294dd898433cd8abf10b3a" version="509893f2521f4f4595773fa96f988527" lucid_version="virtual_connect_fwsc.all.lin@4.85__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.85" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The list of enhancements in 4.85&nbsp;version can be found in the HPE Virtual Connect Release Notes at URL<strong>:&nbsp;</strong><a href="http://www.hpe.com/info/vc/manuals">http://www.hpe.com/info/vc/manuals</a></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The list of issues resolved in 4.85&nbsp;version can be found in the HPE Virtual Connect Release Notes at&nbsp;URL<strong>:&nbsp;</strong><a href="http://www.hpe.com/info/vc/manuals">http://www.hpe.com/info/vc/manuals</a></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.80" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The list of enhancements in 4.80&nbsp;version can be found in the HPE Virtual Connect Release Notes at URL<strong>:&nbsp;</strong><a href="http://www.hpe.com/info/vc/manuals">http://www.hpe.com/info/vc/manuals</a></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The list of issues resolved in 4.80&nbsp;version can be found in the HPE Virtual Connect Release Notes at&nbsp;URL<strong>:&nbsp;</strong><a href="http://www.hpe.com/info/vc/manuals">http://www.hpe.com/info/vc/manuals</a></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1655bc494b334729864d929c38544849" version="abbac2961eef4e63ba2ca4e302a0e772" lucid_version="Gen9_EXP.Esxi@5.08__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.08" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Gen10 plus UBM type 1/2/3 backplanes</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Smart Carrier Authentication Failure issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.22 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added ESXi 7.0 support.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9aed1e81a6884625ab102862e1a82c88" version="7275b324c5d544ccaa6705c2e4e81405" lucid_version="iavf.w2k12_r2@1.12.9.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.12.9.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation library iavfmsg.dll.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.7.119.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f164fee24b024bb9b6d0636563b8a349" version="d29306fad0424a23825077884a917618" lucid_version="Trumpkin.16gb.win@1.04(A)__sc-windows-fw-nvdimm_en"/>
      <revision_history>
        <revision>
          <version value="1.04" revision="A" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial relaese.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.04" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial relaese.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="52abbcdaa353433f863db3360468056d" version="17f689638fe444c59a3602fa72c1a870" lucid_version="Gen10Plus_UBM3_Backplane_PIC@1.20__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="17666522baed46e695f28d4315d6fdb8" version="20e1050cec0a4d948f4b6226c1140582" lucid_version="MLNX_Ethernet_Only_NIC_MFT_FW_package.x64@1.0.0.4-rev1__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device is&nbsp;updated to 14.29.1016:</strong></p>

<p>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</p>

<p><strong>Following New features and Changes are included in version 14.29.1016:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in version 14.29.1016:</strong></p>

<ul>
	<li>An issue that caused the sent packet to hang while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>A rare case where the the device froze&nbsp;while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance while using the VSC to trigger the send_ring_doorbells.</li>
	<li>An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.</li>
	<li>An issue that caused the fragmented IP packets to drop was fixed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device is&nbsp;updated to 14.28.1002:</strong></p>

<p>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</p>

<p><strong>Following New features and Changes are included in version 14.28.1002:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in version 14.29.1016:</strong></p>

<ul>
	<li>An issue that caused the sent packet to hang while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>A rare case where the the device froze&nbsp;while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance while using the VSC to trigger the send_ring_doorbells.</li>
	<li>An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.</li>
	<li>An issue that caused the fragmented IP packets to drop was fixed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="205e86b4ae1e4a28ae1e3cf39faf17ba" version="f95e2191a7144759a7d00f4e5befb132" lucid_version="MB004000GWWQH_MB002000GWWQF_MB001000GWWQE_x64@HPG3(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update includes a fix that prevents unrecoverable read errors in highly localized write intensive workload, and a new servo code revision that improves performance under specific vibration conditions.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b6cb1e645c374b3e92e6a0688121990e" version="f3de02ce9a154305af6bbc66d8075621" lucid_version="EG000300JWSJP_EG000600JWJNH_EG001200JWJNK_ESXi@HPD2(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4dae182fcdec4e4aa31d1ea079120a60" version="a4fbf699fa7f4607b2624c9a764f2977" lucid_version="EG001800JWFVC_x64@HPD3(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4619ed3e4942429da3e6c3f145126229" version="526eaea248ab401fbb3c485c35d05d49" lucid_version="i36.vmware@2.80_10-16-2020(B)__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.80_10-16-2020 (B)&nbsp; contains updates to the component packaging and is functionally equivalent to ver. 2.80_10-16-2020.&nbsp; It is not necessary to upgrade with Revision B if a previous component Revision was used to upgrade the system ROM to version 2.80_10-16-2020.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.80_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5676950ebe02418986b260051b7d33cb" version="3209a2c45aba4284802eeb7340d5c470" lucid_version="nicfwupg_intel_bl.win64@1.0.2.3__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.2.3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This firmware is updated to maintain compatibility with the updated Windows ixn drivers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.5" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where the &quot;Firmware Image Properties,&quot;&nbsp;&quot;Device Level Configuration,&quot;&nbsp;and &quot;Link Speed Status&quot; options in NIC HII menu disappear when F7 is pressed.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2b44e5307a9948769c51d6ac1f276915" version="fb408360ab094552956461a9b475316d" lucid_version="U41.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a9e8e46bd6de460ea736a9be4499f26a" version="2e170510af27472e84249a4614f89228" lucid_version="MB008000JWRTD_ESXi@HPD1(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="453b4ea1f87f45c98bbb1d1a44fa8e02" version="330456640bee4a069f7317cab0d05064" lucid_version="P230i_P430_P431_P731m_P830i_P830.Lin_x64@5.02__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.02" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The firmware updates could fail while SmartCache is enabled due to active I/O in the Smart Cache.</li>
	<li>The serial output of the expander could fail to be populated in the controller logs due to the buffer not being handled appropriately by the controller</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.54 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>DDR cache could be randomly disabled after several boots</li>
	<li>A hot-inserted replacement drive might show as a predictive failure if the original drive was identified as a predictive failure.</li>
	<li>Controller cache module might be marked as permanently disabled if the Smart Storage Battery is removed or failed while the system is online, even if SSA was previously used to enable write caching without a backup power source.</li>
	<li>Controller can become unresponsive due to a SmartCache pending flush operation when a read-ahead and a read-fill are performed in sequent.</li>
	<li>System might stop responding if a parity error is found during surface scan of a RAID6 volume. (POST Lockup 0x13)</li>
	<li>System fans might go to 100% if connected drives were spun down</li>
	<li>Issue where a controller crash dump may not be collected after a controller failure</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e75e513801aa44c1b7614f2e99083381" version="8484bf0f92144d509ced7c7e3e8405f4" lucid_version="U26.VMware@2.66_07-19-2019__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.66_07-19-2019" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where the system may experience a machine check after updating to the latest System ROM which contained a fix for an Intel TSX (Transactional Synchronizations Extensions) sightings. The previous microcode was first introduced in the v2.62 System ROM. This issue only impacts systems configured with Intel Xeon&reg; D-1500 processors. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.64_04-04-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4ecda510f4cf4aef9ac80ad782d1c36e" version="311be1895f7746e9bc1181d9b202b4aa" lucid_version="A41.win.x64@2.44_11-13-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.44_11-13-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices.  This option would only be used for PCIe Adapters that support his level of bifurcation. </p><p>Added support to increase the maximum amount of system memory to 8TB.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed a rare issue where the system may fail to boot after a warm reset.</p><p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.</p><p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.42_07-17-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option for DRAM Burst Refresh Mode to provide mitigation for TRRespass and Targeted Row Refresh exploits. This option should be configured to Disabled to mitigate the TRRespass vulnerability. Setting this option to Disabled may have a minimal impact to system performance. The default setting is Enabled.</p>

<p>Added a new BIOS/Platform Configuration (RBSU) option in the Minimum Processor Idle Power Core C-State setting for C1 State. This option allows for power savings during certain workloads without the performance impacts of C6 State.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where uncorrectable memory errors are seen when running memory intensive workloads with LRDIMMs.</p>

<p>Address an issue that could cause a slight degradation of performance.</p>

<p>Resolved an issue with NVMe hot add or removal which may result in an unrecoverable I/O error reported in the Integrated Management Log (IML).</p>

<p>Addressed an issue where the UEFI Shell command GetPciRom may not display information for PCI expansion device drivers.</p>

<p>Addressed an extremely intermittent issue with AMD Epyc 1st Gen processors that would cause a critical error and system reset.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="43e2b01e979548ad962efb95de5a6d12" version="b27909d3749e403c8e698eac34a2eacd" lucid_version="MB2000JFEML_MB4000JFEMN_x64@HPD6(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.</li>
	<li>The firmware also includes emergency power off improvements.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.</li>
	<li>The firmware also includes emergency power off improvements.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0304d65ecdff4ea58d39c91896e3e228" version="e20968c891b444c6b6de68a73461ce32" lucid_version="ilo3.win2016.x64@4.0.0.0(B)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.0.0.0" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed a component installation failure (error message &quot;The iLO 4 Core Driver must be installed before installing this package&quot;) when Windows Device Guard is enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.0.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Windows Server 2019.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e420d2824f1a4f3980b18730d5e2bcc4" version="3b510f5dfbf04414b2ce803a4d0454fe" lucid_version="elxnet_bl.vmware67@2020.03.09__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.03.09" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects&nbsp;a vmnic flapping issue which impacts network&nbsp;connectivity.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.12.20 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f4d3c3f0b12d4c1da09c3d11188e06cf" version="5a07e8eb07cc4b8193943bcb0ba57b73" lucid_version="VS000480KXALB_x64@85030G00(B)__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="85030G00" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added Support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b0057e5ba3444c3eb76eb15c0d0d8adc" version="cdf0e91a583348f492e3386be2af5aa1" lucid_version="nmlx5_en.vmware65@2020.11.11__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.11.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New Features in smart component version 2020.11.11:</strong></p>

<ul>
	<li>Added support for the following adapters:
	<ul>
		<li>HPE Ethernet 200Gb 1-Port QSFP56 MCX623105AS-VDAT Adapter (HPE Part Number: P10180-B21)</li>
	</ul>
	</li>
</ul>

<p><strong>New features and changes in version 4.16.70.1:</strong></p>

<ul>
	<li>An event will be sent to notify the administrator if the power required by the network adapter is higher than that available on the PCIe slot.</li>
	<li>Support for trusting Differentiated Services Code Point (DSCP) and setting default value for RoCE traffic.</li>
	<li>A&nbsp;new counter that enables the user to query per Virtual Function counters.</li>
	<li>RX out-of-buffer counter to indicate any lack of software receive buffers.</li>
	<li>Module parameter to enforce specific RoCE version.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version&nbsp;in 4.16.70.1:</strong></p>

<ul>
	<li>
	<p>The &quot;esxcli network sriovnic vf stats&quot; command was not supported. When running this command on a vmknic, a failure message was displayed.</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.03.09" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New Features in smart component version 2020.03.09:</strong></p>

<ul>
	<li>Added support for the following adapters:
	<ul>
		<li>HPE Ethernet 10/25Gb 2-port 642SFP28 Adapter (HPE Part Number: P24837-B21)</li>
		<li>HPE Ethernet 10Gb 2-port 548SFP+&nbsp; (HPE Part Number: P11338-B21)</li>
	</ul>
	</li>
</ul>

<p><strong>New features and changes in version 4.16.70.1:</strong></p>

<ul>
	<li>An event will be sent to notify the administrator if the power required by the network adapter is higher than that available on the PCIe slot.</li>
	<li>Support for trusting Differentiated Services Code Point (DSCP) and setting default value for RoCE traffic.</li>
	<li>A&nbsp;new counter that enables the user to query per Virtual Function counters.</li>
	<li>RX out-of-buffer counter to indicate any lack of software receive buffers.</li>
	<li>Module parameter to enforce specific RoCE version.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version&nbsp;in 4.16.70.1:</strong></p>

<ul>
	<li>
	<p>The &quot;esxcli network sriovnic vf stats&quot; command was not supported. When running this command on a vmknic, a failure message was displayed.</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4c78cfc099d944a5b3790aa796ed8a49" version="225b70c27c564e63ae180960589bf693" lucid_version="i40ea.w2k16@1.13.104.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.13.104.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an traffic packets making cert failure seen when packets transferred to VLAN after RDMA function enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.171.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product added implementation of Advanced Link Speed functionality in Physical Function (PF) driver that are supports dynamic link speed changes.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which Blue Screen of Death （BSOD） (0x133) occurred with Remote Access Role service during shutdown.</li>
	<li>This product correct an issue which system crashed after few modifying Intel&reg; Advanced Network Services (Intel&reg; ans) Team type with tagged Virtual Local Area Network (VLAN).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="97f5388c948445bc9249ae42cebeaaec" version="ebd1a3072f6e475eadd0816cb5e7a09c" lucid_version="ql_iscsiuio.sles12sp4.x86_64@2.11.5.13-3(B)-rev2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.11.5.13-3" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product no longer supports ProLiant Blade servers and devices. Blade&nbsp;servers and devices&nbsp;are now supported by the&nbsp;<a href="https://www.hpe.com/global/swpublishing/MTX-e4fc7933c004453e9ae21103a1">HPE Blade QLogic NX2 iSCSI Offload IO Daemon for SUSE Linux Enterprise Server 12 SP4</a>.</p>

<p>This product no longer supports Synergy servers and devices. Synergy servers and devices are now supported by the&nbsp;<a href="https://www.hpe.com/global/swpublishing/MTX-396113a4bb074577bd00fdae57">HPE Synergy QLogic iSCSI Offload IO Daemon for SUSE Linux Enterprise Server 12 SP4</a>.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an&nbsp;iSCSI discovery failure with VLAN.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.11.5.13-3 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an&nbsp;iSCSI discovery failure with VLAN.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ab1694a2c3b34d68b6e9d41c15960bf5" version="b3e0e8c307ae41e7b39514aae9bea9b1" lucid_version="ixs.w2k19@4.1.219.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.219.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1.197.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="58d1a656061f4ce896db266c33677e70" version="430dfb3f9f934de2b59d23a493b9f371" lucid_version="iavf.rhel7.x86_64@4.0.2-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.0.2-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 7 update 9</li>
	<li>This product now supports the following servers:</li>
</ul>

<p style="margin-left:80px">&nbsp;HPE Superdome Flex 280 &nbsp;<br />
&nbsp;HPE Superdome Flex Server &nbsp;<br />
&nbsp;HPE Superdome Flex 2&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.9.5-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7 Update 8</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6510bb61b44e4df589649e5642d32bf1" version="c6869321e71c44bea189b0050a1e9cf5" lucid_version="intel_i40ea.w2k19@1.13.104.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.13.104.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an traffic packets making cert failure seen when packets transferred to VLAN after RDMA function enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.177.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="862d36dd920c478ca6dcfdb5f392893a" version="7d1e6e78fdb44ef79826161c653da5e0" lucid_version="MB008000GWWQU_MB006000GWWQT_x64@HPG2(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b4038948946c452fb5d749b985ef4ee9" version="6bf82d92a8a449d8b8492c74573c484b" lucid_version="bnxtnd.w2k12_r2@214.0.247.1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="214.0.247.1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;the following network adapters.</p>

<ul>
	<li>HPE Ethernet 10Gb 2-port 537SFP+ Adapter</li>
	<li>HPE Ethernet 10Gb 2-port 537SFP+ FLR Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which .max SRIOV VFs are not loading when Windows hypervisor and Windows VMs are used.<br />
This product correct an issue which VF driver won&#39;t install on some devices.<br />
This product correct an issue which FW hangs while allocating more PF-Vports<br />
This product correct an issue which fail bono commands right away if HW is surprise removed<br />
This product correct an issue which few VPORTS available in SF mode when SR-IOV is used.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="214.0.177.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0149953b59694d068d7ec0cd6a92031e" version="ae530ca59bdf4fee9ff85d59b9ed0403" lucid_version="brcmfcoe.driver.esxi67.zip_rt@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Updated to Driver version 12.0.1278.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.12.01 (b)" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Updated to Driver version 12.0.1278.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<table>
	<tbody>
		<tr>
			<td>
			<p>Fixed the following:</p>

			<ul>
				<li>Purple Screen of Death(PSOD) at random intervals on HPE FlexFabric 20Gb 2-port 650FLB Adapter</li>
				<li>Link down after 1000 times port down and up iterations on switch.</li>
				<li>Detaching is not completing because lpfc_do_work_event can&#39;t exit.</li>
				<li>Slab memory use after free causing memory leak.</li>
				<li>Small Computer Sytem Interface(SCSI) command is used after done call.</li>
				<li>Target reset does not report original status</li>
			</ul>

			<ul>
				<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
			</ul>

			<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex&nbsp;XE-102 Based&nbsp;Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following&nbsp;link:</p>

			<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></p>
			</td>
		</tr>
		<tr>
			<td>&nbsp;</td>
		</tr>
	</tbody>
</table>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d6cef3e7c9484a989ca5a04fc11b29f2" version="944820e8913042e0aeb3f78519804029" lucid_version="PICGen10.Linux@1.0.7(D)__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.7" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.7 (D) contains updates to the component packaging and is functionally equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (D) if a previous component revision was used to upgrade the firmware to ver. 1.0.7.This is the initial version for HPE Gen10 Plus servers.<br />
&nbsp;</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is required to enable the support. iLO5 version 1.40 or above is required to upgrade to this version.</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the support. This version of firmware does not include any changes for Gen10 platforms with Intel Processors or AMD EPYC 7001 Generation Processors. iLO5 version 1.40 or above is required to upgrade to this version.</p>

<p>This is the initial version for HPE Gen10 Plus servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.7 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<P><B>Important Notes:</B></P>Ver. 1.0.7 (B) contains updates to the component packaging and is functionally equivalent to ver. 1.0.7.  It is not necessary to upgrade with Revision (B) if a previous component revision was used to upgrade the firmware to ver. 1.0.7.This is the initial version for HPE Gen10 Plus servers.<br>&nbsp;<P><B>Firmware Dependencies:</B></P>For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is required to enable the support. iLO5 version 1.40 or above is required to upgrade to this version.<P><B>Enhancements/New Features:</B></P>Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the support. This version of firmware does not include any changes for Gen10 platforms with Intel Processors or AMD EPYC 7001 Generation Processors.   iLO5 version 1.40 or above is required to upgrade to this version.<p>This is the initial version for HPE Gen10 Plus servers.<P><B>Known Issues:</B></P>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="C8510" version="af07065896cd4674abe33248260301a2" lucid_version="emulex_storport_x64.win_2016_rt@12.8.334.6__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.334.6" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;12.8.334.6</p>

<p>The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.165.0 (b)" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;12.6.165.0</p>

<p>Added the following support :</p>

<p><br />
Removed the raw driver file folder.&nbsp; The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a3459c07ef5f45fe84a4a598d99e1833" version="5f4d755ef4b64e9fad251cf170f9eedb" lucid_version="HP-CNA-FC-Broadcom-Enablement.sles12.x86_64@12.0.1339.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1339.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version: 12.0.1339.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1264.0 (c)" revision="c" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version: 12.0.1264.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<table>
	<tbody>
		<tr>
			<td>
			<ul>
				<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
			</ul>
			&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></td>
		</tr>
	</tbody>
</table>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cfae6248bdc149bc8eddf29048411fb5" version="719de46265e845d0b48aae0420646276" lucid_version="MegaSAS2.win2012_R2.x64@6.714.18.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="6.714.18.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for the Apollo 4510 system</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.714.8.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial driver release for HPE Smart Array P Class MR Gen10 controllers.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7ba136be4b834a5699f5c5fff754d07b" version="d6c16793f2164c92994afc7c6a382088" lucid_version="nicfwupg_qlnx2_bl.win64@1.0.2.2__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.2.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where powering on the system with any I/O virtualization functionality (NPAR, SR-IOV, etc) enabled results in an Uncorrectable Machine Check Exception (UMCE).<br />
This product addresses an issue where the WOL option is displayed on the Human Interface Infrastructure (HII) menu for 534M and 630M mezzanine devices, even though WOL is not supported on those devices.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.9 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product has been rebuilt with the correct digital signature. It does not require dual signatures.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d892124a7e30440eb7f95535da6dada7" version="4d2addac81bf4876b47f54925d3f1ecc" lucid_version="i40en.vmware70@2020.05.29__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.05.29" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a1d749637b0b455e9a43d66fc6eed023" version="3f2c82eed2a34e6c990bf231a12647b6" lucid_version="MZPLJ1T6HBJR-000H3_MZPLJ3T2HBJR-000H3_MZPLJ6T_ESXi@EPK74H3Q-rev1__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="EPK74H3Q" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="EPK74H3Q" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="13683c4504bf424989ac644f48168972" version="e2fb2b6721a540fba805742d272e28c8" lucid_version="i40eb.w2k16@1.13.104.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.13.104.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an traffic packets making cert failure seen when packets transferred to VLAN after RDMA function enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.171.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product added implementation of Advanced Link Speed functionality in Physical Function (PF) driver that are supports dynamic link speed changes.<br />
&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which Blue Screen of Death （BSOD） (0x133) occurred with Remote Access Role service during shutdown.</li>
	<li>This product correct an issue which system crashed after few modifying Intel&reg; Advanced Network Services (Intel&reg; ans) Team type with tagged Virtual Local Area Network (VLAN).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7af26f11b3bd4a2f99d0fd0dcc72a2db" version="8194eda63ba64db4be7d308d8cc1502c" lucid_version="mlnx_en_roce.sles15sp2.x86_64.rpm@4.9__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f22e031456d1410688940c3efe38cf1d" version="04067fbbcc864412a59ba814029eb6ab" lucid_version="U48.win.x64@2.20_10-27-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.20_10-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.</p>

<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>

<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.</p>

<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.&nbsp; These issues are not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.18_06-24-2020" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode for Intel Pentium processors which provides mitigations for security vulnerabilities documented as CVE-2020-0543 as well as CVE-2020-0548 and CVE-2020-0549. These security vulnerabilities are documented in Intel Security Advisories INTEL-SA-00320 and INTEL-SA-00329. These issues are not unique to HPE servers. This update does not impact systems using Intel Xeon based processors.</p>

<p>Addressed an issue where the system would become unresponsive with a Red Screen or hang when booting to FreeBSD R12.1 from a USB device when in Legacy Boot Mode. This issue did not impact systems configured for UEFI Boot Mode or when booting from other types of media.</p>

<p>Addressed an issue where a dual port networking device may show up in the System Configuration Utilities with two Port 1 names instead of properly being represented as Port 1 and Port 2. This did not impact any functionality to the device.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="436670aad3944dd794f4bdcf4feb2b72" version="35721f927f6d4570b1d55be7127e391f" lucid_version="MO0400JFFCF_MO0800JFFCH_MO1600JFFCK_x64@HPD9(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1fda2856afe34ef885a535a6a8013679" version="c8180f8a3240446a9bd22383987ee57d" lucid_version="pwrPICflash.DL580Gen8.linux@4.1(E)__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver.&nbsp;4.1 (E)&nbsp;contains a change to the Firmware RPM install command name from &ldquo;cpqsetup&rdquo; to &ldquo;hpsetup&rdquo; and is functionally equivalent to ver. 4.1.&nbsp; It is not necessary to upgrade with Revision&nbsp;E if a previous component revision was used to upgrade the firmware to version 4.1.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This is the initial version of the firmware.</p>

<p><strong>Known Issues:</strong></p>

<p>The smart component prompts for reboot unnecessarily when the installation procedure is completed. Reboot is not required after installation for updates to take effect and hardware stability to be maintained.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>
 <strong>Important Notes:</strong><br />
 Ver. 4.1(D) contains updates to the OS installation support for HP Smart Update Manager. The Power Management Controller Firmware contained within Ver. 4.1(D) is Ver. 4.1. Therefore, it is not necessary to upgrade with ver. 4.1(D), if the Power Management Controller firmware version is 4.1.</p>
<p>
 <b>Firmware Dependencies:</b></p>
None
<p>
 <b>Enhancements/New Features:</b><br />
 This is the initial version of the firmware.<br />
 <b>Known Issues:</b></p>
The smart component prompts for reboot unnecessarily when the installation procedure is completed. Reboot is not required after installation for updates to take effect and hardware stability to be maintained.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="12eaa829eeb841af89f7ea134993346e" version="4489c20d5cef4c96a356ba1e48b37e34" lucid_version="MO001600KWVNB_MO003200KWVNC_MO006400KWVND_x64@HPK3__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Fixed SSD weargauge report error issue.</li>
	<li>Fixed Assign FWState as TR_DONE_ERR at the correct location.</li>
	<li>Prepare proper response data for Get Message Type Supported MCTP Command.</li>
	<li>Added code to preserve current feature values cross live firmware update.</li>
	<li>Allocate 4 bytes instead of 2 bytes for parameter code.</li>
	<li>Changed the value for NLB equal to NSize -1.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue where the SSID was not programmed correctly to the drive. This may cause issues with the drive not being identified correctly in the Integrated Lights Out Utility.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9ea83d5d4cdf449690664479d7c8538a" version="20406557fd7c4a87a0d7c8d4d1ab8d46" lucid_version="MB006000JWKGN_x64@HPD1(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ac732738370b4df180761b2b7435b65d" version="8cc5e08a22ab42849b1a7da7c7be4841" lucid_version="mlnx_en_roce_mlx5.rhel7u9.x86_64.rpm@5.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.2:</strong></p>

<p><strong>For ConnectX-5 Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>CQE compression support for Rx multi-strides packets.</li>
		<li>Configuring QoS on a single QP or on a group of QPs.</li>
		<li>Encap/decap hardware offload of IPv4 traffic over MPLS-over-UDP. This can be used in networks with MPLS routers to achieve more efficient routing.</li>
		<li>Connection tracking rules on VFs to forward traffic from one VF to the other.</li>
		<li>Offloading sFlow sampling rules.</li>
	</ul>
	</li>
</ul>

<p><strong>For ConnectX-5 Adapters and ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>A locking mechanism to enable parallel insertion of rules into the software steering using the mlx5dv_dr API. The parallel insertion improves the insertion rate and takes place when adding Rx and Tx rules via the FDB domain.</li>
		<li>Option to match mlx5dv_dr API on Geneve tunnel using a dynamic flex parser. The option header consists of class, type, length and data. The parser should be configured using devx command, after which a rule can be created to match on parser ID and data.</li>
		<li>Geneve tunneling offload, including matching on extension header.</li>
		<li>Parallel insertion and deletion of offloaded rules using multiple&nbsp;OVS threads.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>[Beta] Modify GTP-U TEID. This support requires flex parser&nbsp;configuration.</li>
		<li>[Beta] Improved performance of OVS Connection Tracking flows by&nbsp;enabling the merge of the multi-table flow matches and actions into one joint flow.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters and above:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Transmitted packet timestamping accuracy can be improved when using a timestamp generated at the port level instead of a timestamp generated upon CQE creation. Tx port time-stamping better reflects the actual time of a packet&#39;s transmission. This feature is disabled by default. The feature can be enabled or disabled using the following command. ethtool --set-priv-flags tx_port_ts on / off.</li>
	<li>Offloading tunnel rules when the source interface is VF (in addition to uplink) in the Hypervisor.</li>
	<li>Using Mirroring Offload with Connection Tracking.</li>
	<li>ASO flow meter using the mlx5dv_dr API, which allows for monitoring the packet rate for specific flows. When a packet hits a flow that is connected to a flow meter, the rate of packets through this meter is evaluated, and the packet is marked with a color copied into one of the C registers, according to the current rate compared to the reference rate.</li>
	<li>ASO first hit using the mlx5dv_dr API, which allows for tracking rule hits by packets. When a packet hits a rule with the ASO first hit action, a flag is set indicating this event, and the original value of the flag is copied to one of the C registers.</li>
	<li>mlx5dv_dr API support for matching on a new field &quot;gtpu_first_ext_dw_0&quot;. This field enables packet filtering based on the GTP-U first extension header (first dword only). To enable parsing of tunnel GTP-U extension header, run the following command. ./cloud_fw_reset.py FLEX_PARSER_PROFILE_ENABLE=3.</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Lx Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>IPsec full offload support for extended sequence number, replay protection window and lifetime packet limit.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;All HCA&#39;s:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>New query GID API that allows for querying a single GID entry by its port and GID index, or querying for all GID tables of a specific device. This API works over ioctl instead of sysfs, which accelerates the querying process.</li>
		<li>Performing multi-host firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reload.</li>
		<li>[Alpha] Firmware live patching in the driver. Live patching updates the firmware without the need to perform firmware reset. However, it can only be applied in scenarios where the difference between the current and new firmware versions are minor, which is decided upon by the firmware itself.</li>
		<li>devlink tool for performing firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reloads the current firmware image from the flash in case no new firmware was pending. For further information, please refer to the the devlink man page.</li>
		<li>A resiliency mechanism for the driver to manually poll the command event queue (EQ) in case of a command timeout. In case the resiliency mechanism finds unhandled event queue entry (EQE) due to a lost interrupt, the driver will handle it, after which the command interface returns to a healthy state.</li>
		<li>Setting a sniffer private flag is deprecated and no longer required. In order to capture offloaded/RoCE traffic, tcpdump can now be run on the RDMA device.</li>
		<li>Added per-port reporters to devlink health to manage per-port health activities. Users can now access the devlink port reporters by specifying the port index in addition to the device devlink name through the devlink health commands API. This update was first introduced in iproute2 v5.8. As part of this feature, mlx5e Tx and Rx reporters are now redefined as devlink port reporters. For examples, please see devlink-health manpage</li>
		<li>Optimized memory consumption of memory registration in huge page systems. As an example, in a 2MB huge page system, 600 MB would be saved for 100 GB memory registration.</li>
		<li>mlx5dv API to modify the configured UDP source port for RoCE packets of a given RC/UC QP when QP is in RTS state.</li>
		<li>Accelerating Tx datapath by saving PCI bandwidth and CPU utilization. The savings are achieved by aggregating multiple packets into a single WQE. The feature is driven by xmit_more for certain traffic types, such as UDP.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.2:</strong></p>

<ul>
	<li>Clearing min_rate on all SR-IOV legacy VFs after setting min_rate to at least one of the VFs did not disable QoS min_rate.</li>
	<li>An empty /usr/src/mlnx-ofa_kernel/default is now no longer created.</li>
	<li>An issue where installing packages through a repository failed after generation of metapackages using --add-kernel-support. The failure occurred due to excessive and incorrect Obsolete headers in those metapackages.Enabled installation of mlnx-ofa_kernel package to /bin/python3 instead of / usr/bin/python3 on RHEL 8.x systems.</li>
	<li>All IPoIB offload packets were wrongly counted as rx_csum_complete. These packets are now identified as rx_csum_unnecessary packets.</li>
	<li>mlx5dv_dr_rule_destroy segmentation fault could happen in rare cases with multiple rules on the same matcher with a different number of actions. This could happen after reusing an already deleted rule memory with less actions.</li>
	<li>An issue of moving to SwitchDev mode after configuring DSCP (Differentiated Service Code Point).</li>
	<li>Global traffic class configuration did not take effect on DC QPs (Dynamically Connected Queue Pairs).</li>
	<li>ib_send_bw traffic frequently dropped to zero when RDMA CM was used, because of incorrect&nbsp;min_rnr_timer setting on the responder side. The min_rnr_timer setting is now aligned with the setting in non-RDMA CM cases.</li>
	<li>Traffic did not pass over VFs with VST QinQ feature is enabled.</li>
	<li>When traffic was sent over Geneve VLAN with Tx VLAN offload enabled and TSO (TCP Segmentation Offload)&nbsp;or Tx csum enabled, traffic could be dropped and not sent to the wire.</li>
	<li>An issue that caused the firmware to restart upon installing mlnxofed-dpdk-upstream-libs package manually.</li>
	<li>Bad utility paths in rdma-core &quot;dracut&quot; hooks on SLES systems, which used to result in the following errors when running &quot;dracut&quot; with the &quot;--add rdma&quot; option. dracut-install:
	<ul>
		<li>ERROR: installing &lsquo;/usr/libexec/mlx4-setup.sh&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/mlx4-setup.sh dracut-install: ERROR: installing &lsquo;/usr/libexec/rdma-set-sriov-vf&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/rdma-set-sriov-vf</li>
	</ul>
	</li>
	<li>Traffic class value was not updated in DCT when set via sysfs.</li>
	<li>A doorbell loss issue on AMD platforms with Secure Memory Encryption (SME).</li>
	<li>Registering memory using mlx5dv_devx_umem_reg while forking. Without this fix, applications which use fork() or similar syscalls while using a memory registered with umem_reg could hang due to incorrect physical page mapping. This fix requires setting the IBV_FORK_SAFE environment variable.</li>
	<li>When&nbsp;unbinding the device resulted in the following message being printed to the dmesg: &quot;failed to disable DC tracer&quot;</li>
	<li>Content of file /sys/class/net//statistics/ multicast might have been out of date and might have displayed values lower than the real values.</li>
	<li>ERSPAN (Encapsulated Remote SPAN) protocol was available only when turning off Tx checksum offload.</li>
	<li>A udev script issue which caused non-mellanox devices to be renamed.</li>
	<li>Missing representor statistics when using ifconfig.</li>
	<li>Fixed wrong value of skb mark of received packets on representors.</li>
	<li>An issue which caused second port representors to be named as first port representors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.1:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>The user can now set a packet pacing rate on the special queues that forward traffic from one physical port to the other.</li>
		<li>Connection Tracking (TC) offload on network interfaces that are in NIC mode, as opposed to SwitchDev mode. Note: This support is currently available for interfaces with physical functions only.</li>
		<li>Limiting SMP MADs on the wire using a Send window mechanism. This allows the user to keep track of the outstanding number of SMP MADs per-port, and allows for limiting this number to shape traffic when the pace of SMP MADs requires control.</li>
		<li>Direct Rule (DR) API support for sampling action to allow duplication and sampling of some ratio of the traffic. The API also allows to perform a set of different DR actions on the sampled traffic.</li>
	</ul>
	</li>
	<li>Enabled on-demand device memory sync to free cached memory.&nbsp;</li>
	<li>Simplified the sanity test that verified which systems must use python3 and not python2, so that when rebuilding the kernel packages using --add-kernel-support, the systems based on RHEL/CentOS 8 were detected.&nbsp;</li>
	<li>Added back rx_dct_connect counter that queries the number of received connection requests for the associated DCTs</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.1:</strong></p>

<ul>
	<li>Extended mlx5 recovery-flow delay on VF driver when PCI interface went down</li>
	<li>ibv_get_device_list returned only accessible devices.</li>
	<li>&ldquo;rpmbuild&rdquo; (that includes basic support for building RPM packages) was not installed by the install script on SLES15 SPx systems when trying to rebuild packages.</li>
	<li>AF_XDP was not functional.</li>
	<li>neohost-backend and neohost-sdk packages were not properly removed by the uninstallation procedure and might have required manual removal before re-installing or upgrading MLNX_OFED driver.</li>
	<li>During MLNX_OFED installation, warning messages related to modules iw_cxgb3 and iw_nes might have appeared in the log.</li>
	<li>Command timeouts occurred when the Hypervisor disabled the VF&#39;s PCI interface. This fix reduces the device removal time to 2 seconds.</li>
	<li>MLNX_OFED/MLNX_EN installer will no longer automatically remove the spdk package when installing the driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="21c71338fdf2430b8b41f3737620822c" version="814f238dee7b4a9588056b3a0ea8a2c3" lucid_version="skylake.win.x64@10.1.18435.8224__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.1.18435.8224" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Add support for Intel devices 201A, 201C, and 206F</li>
	<li>Add support for Superdome Flex 280</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.1.18015.8142" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Intel devices 203A, 203D, 2078, and 207A.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d40709c9a4334c3ab0e384d0ba51692d" version="6d06d77f70f74d90abbf8d17fa8d1b5f" lucid_version="emulex_storport_x64.win_bl@12.8.334.6__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.334.6" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;12.8.334.6</p>

<p>The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.165.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;12.6.165.0</p>

<p>Added the following support :</p>

<p><br />
Removed the raw driver file folder.&nbsp; The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>Hyper-V Virtual Machines (VMs) could not access storage arrays if those Virtual Machine (VM) had been shut down and restarted over 512 times.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="057a33153b064c9280dd7da9d3d5a47a" version="98a4c216ad7e4be4a13823247bb7e861" lucid_version="EG001800JWJNL_EG002400JWJNN_x64@HPD2(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2b01702f6be343c09f8208f8aab17afb" version="df62412c2fe54a5d872f45a3b6af929d" lucid_version="Flattop@52.16.3-3913-rev2__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="52.16.3-3913" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="52.16.3-3913" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Build</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8c0c47d5bf1446e88cb749de3c7fd2d0" version="8bb5c32f66374026a4d568c1fa5a68f1" lucid_version="VK000240GWEZB_VK000480GWEZC_VK000960GWEZD_VK00_x64@HPGE(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGE" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGE (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dea19449209743ffa1d2262e07eafb25" version="42fd7e868a8949fbb1ff1298af627855" lucid_version="U33.linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4e7d93b236d542028248e102c6a2c879" version="1f7b7522f66e413f98b8830c770ce432" lucid_version="lpfc.driver.esxi70.zip_bl@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.8.329.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.6.228.4</p>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="39676e9bd8d74e11b8837e3f6ebabd5c" version="3754ba59b53149a185dd16db107b1533" lucid_version="ssa.linux.x64@5.10.44.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.10.44.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Build</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="074cd65cf284444dbd64a63e5f809ff6" version="954f5c0d87144a1e90942920580ae751" lucid_version="MB014000GWUDA_x64@HPG2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c5169d515a774f51aa01a14f6284794f" version="726513d685ec405996d8e7241b191a52" lucid_version="qfle3.vmware67@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses a Purple Screen Of Death (PSOD) seen during traffic scheduling.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.14" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue where Purple Screen Of Death(PSOD) when ethernet link connected to 533FLR-T/536FLR-T Adapters.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c55c1821244f45499ef3e6eefbb25ee1" version="ac37e1a512c0461e9e95e70d3cf6c554" lucid_version="ilo3.win.x64@4.0.0.0-rev1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.0.0.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Aligned system and operating system support with the production Service Pack for ProLiant:</p>

<ul>
	<li>Removed support for Windows Server 2008 and Windows Server 2008 R2.</li>
	<li>Removed support for iLO 3.</li>
	<li>Removed support for HP ProLiant G7 and HP ProLiant Gen8 systems.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.0.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Aligned system and operating system support with the production Service Pack for ProLiant.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a786a49cd75640888a37e362b009fb3c" version="ad109d8b4cbb45eba1957689ba0511ec" lucid_version="vxs.w2k16@2.1.192.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.1.192.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.1.133.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1e56a84a25b64abe8843f631fbdeb34d" version="acecb19d0bb04b1589b16e34691e9952" lucid_version="qlgc_openiscsi.sles12sp4@2.0-873.113-1(D)-rev1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.0-873.113-1" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product no longer supports Synergy servers and devices. Synergy servers and devices are now supported by the&nbsp;<a href="https://www.hpe.com/global/swpublishing/MTX-1c21454a8fb541f4a27afc84c2">HPE Synergy QLogic FastLinQ Open-iSCSI Driver for SUSE Linux Enterprise Server 12 SP4</a>.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.0-873.113-1 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b95f6b9ec4c246469be03e39a2db0a69" version="b446fd4fbb8b47a1a8481601c130cead" lucid_version="qlogic_storport_x64.w2k12R2_rt@9.4.1.20(b)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="9.4.1.20" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version&nbsp;9.4.1.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.4.1.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version&nbsp;9.4.1.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b9e7f18a1693495cbaf0b6cf2ac1c5fb" version="0d7b08ed663d47e2a860714f4492393d" lucid_version="Mesa_Verde_P824i-p_Esxi@24.23.0-0043(A)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="24.23.0-0043" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for the Apollo 4510 system</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Over-temp issue was a false IML due to a &gt;=60C threshold, modified the threshold to &gt;65C in new version.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="24.23.0-0042" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for the Apollo 4510 system</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="89efa5dd7c1545c0ad8e16f58fcdfeb6" version="9c22c5cc997d4b678633ba92b3bb24f1" lucid_version="ixgbe_bl.sles15@5.9.4-1(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.9.4-1" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 15 SP2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.6.4-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="121ced484e6647bf98b3a4bca60530c2" version="48eb3e78a02b4bb8b09eb8b3d216ac57" lucid_version="VK003840GWSXL_x64@HPG2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2720830f9ed94ee48b3be0778488e00f" version="2d9971b9341e4bd8914f8b99847679ea" lucid_version="virtual_connect_fwsc.all.win@4.85__sc-windows-fw-bladeinf_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.85" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The list of enhancements in 4.85&nbsp;version can be found in the HPE Virtual Connect Release Notes at URL<strong>:&nbsp;</strong><a href="http://www.hpe.com/info/vc/manuals">http://www.hpe.com/info/vc/manuals</a></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The list of issues resolved in 4.85&nbsp;version can be found in the HPE Virtual Connect Release Notes at&nbsp;URL<strong>:&nbsp;</strong><a href="http://www.hpe.com/info/vc/manuals">http://www.hpe.com/info/vc/manuals</a></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.80" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>The list of enhancements in 4.80&nbsp;version can be found in the HPE Virtual Connect Release Notes at URL<strong>:&nbsp;</strong><a href="http://www.hpe.com/info/vc/manuals">http://www.hpe.com/info/vc/manuals</a></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The list of issues resolved in 4.80&nbsp;version can be found in the HPE Virtual Connect Release Notes at&nbsp;URL<strong>:&nbsp;</strong><a href="http://www.hpe.com/info/vc/manuals">http://www.hpe.com/info/vc/manuals</a></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bda7d035201d46ffadf44995b633fe12" version="604ceea7230e45ff966e6680fd9e2689" lucid_version="VO000480JWDAR_VO000960JWDAT_VO001920JWDAU_ESXi@HPD8(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us" style="color: rgb(0, 0, 255); text-decoration: none;">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (D)" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us" style="color: rgb(0, 0, 255); text-decoration: none;">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f5aa8733027b4498a80cd2e690d91986" version="2ccec69d930d455195f11af49815020b" lucid_version="U31.Linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="807963ddd98b4f45bbbe57b7d0cec0f8" version="1710140e6fb04710bf9c19b22f0c9675" lucid_version="nicfwupg_qlnx2_bl.vmware@1.2.2__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.2.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports VMware vSphere 7.0 U1.<br />
This product now supports VMware vSphere 6.7 U3.<br />
This product now supports VMware vSphere 6.5 U3.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where powering on the system with any I/O virtualization functionality (NPAR, SR-IOV, etc) enabled results in an Uncorrectable Machine Check Exception (UMCE).<br />
This product addresses an issue where the WOL option is displayed on the Human Interface Infrastructure (HII) menu for 534M and 630M mezzanine devices, even though WOL is not supported on those devices.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.1.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports VMware vSphere&nbsp;7.0.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3b83490f55194800be58721a957dd6a1" version="a127e36fc4ac4c7f83604c22b617a9c1" lucid_version="MB012000GWTFE_MB014000GWTFF_x64@HPG7(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG7" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG7" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware revision improves low-temperature performance and Error Correction Code (ECC) error recording for some commands.&nbsp;</li>
	<li>It also improves internal logging capabilities for failure analysis.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="32d8e1ccf0eb436eb79a5663e0e83dbc" version="94c2677f40eb4b78994e41e5fe6c466e" lucid_version="P95.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="70da4993d44e45a79517f24aa5d41862" version="c84fa45738734ddfa3eb162be86415b2" lucid_version="qedentv.vmware70@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses a Purple Screen Of Death (PSOD) seen on systems operating in a complicated VLAN environment.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.05.29" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aa3d4b3746e2485289f458134b1187cd" version="e7eec9edd68848238e978ebaedb56512" lucid_version="Apollo_2000_Gen10Plus.Esxi@1.27__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.27" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4a440c014d52404fb26a46463eb5e62b" version="ad1e5686df41431dbaf3bfc4aa5cbb94" lucid_version="SmartDQ2.win@106.106.2.1229__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="106.106.2.1229" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>initial release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="106.64.4.1384" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c89e43e26231479bbdf6b9f0111deee2" version="5bc40479d0ab40bbb2b8dafc6630f2f5" lucid_version="MB4000JEFNC_MB6000JEFND_x64@HPD9(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d36299863db5430ea15927c19344f09a" version="132ae4e75f9b4be19375b4ebab9121c6" lucid_version="Gen10Plus_UBM2_NVMe_Backplane_PIC@1.16__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="1.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Release</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.14" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f588f22bf7a8476e978b8ff370066200" version="9fa6ed3d98504ebc8a11446b70cc8768" lucid_version="MB6000GEQUT_MB8000GEQUU_x64@HPGB(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGB" revision="H" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was only found during supplier ongoing reliability testing.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGB (G)" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was only found during supplier ongoing reliability testing.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0a96bc740aee4364b774edfa452ca9a4" version="ae8bc1ff791b4cf5ab08193439d0bd0b" lucid_version="EH000900JWHPP_EH000600JWHPN_EH000300JWHPL_x64@HPD4(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ea55ec7473304ea29dd406dfd2137028" version="7310436a3ecd4eb4b9a304944325a545" lucid_version="VK000150GWCNN_VK000240GWCNP_VK000480GWCNQ_x64@HPG1(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7a662f7d75e94013936ff11b1e7b1553" version="5249928f049242e2998a48ccc80bb585" lucid_version="MLNX_VPI_Ethernet_Infiniband_HCA_FW_package.esxi65@1.0.7__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d9c3a00a773f42a180ec8a2979413243" version="d0be92b56d114be6afe63a6d7181f6e2" lucid_version="MB8000GFECR_x64@HPG6(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fb6a68c03bce4024bbd1868e36b3725e" version="7851e8b787a940fdb6cd560eb34c87c9" lucid_version="hpsa.sles12.x86_64.rpm@3.4.20-188(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.4.20-188" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Add support for SuSE Linux Enterprise Server 12 SP5</li>
	<li>Added PKCS signing process to fix the secure boot hang issue on Linux SLES12 SP5</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.4.20-188" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Add support for SuSE Linux Enterprise Server 12 SP5</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="067bbc5cffe1421194a0097838afd34e" version="380c66b326b64a4db9c55f7d0d5b98f3" lucid_version="hp-snmp-agents_rhel7_x86-64@10.9.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="10.9.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed issue where the HPE Synergy 3820C 10/20Gb Converged Network Adapter was showing not supported</li>
	<li>Corrected invalid utf8mb4 char in database</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.9.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Support for Red Hat Enterprise Linux 7.8</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>&nbsp;the hp-snmp-agents service version 10.9.0 on an HPE ProLiant Gen9 Server or an HPE Synergy Gen9 Compute Node may experience a segfault after installation or restart of the hp-snmp-agents service. cmahostd or cmapeerd process will be killed after the segfault.&nbsp; Pleaer review customer advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00098957en_us" style="color:#0563c1; text-decoration:underline">a00098957en_us</a>&nbsp;for additional details.</li>
	<li>The OS version reported by hp-snmp-agents reported a&nbsp;mismatch with the newer Linux OS distros. i.e., &quot;SUSE Linux Enterprise Server 12&quot; v.s &quot;SUSE Linux Enterprise Server 12 SP5&quot;&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="07347f7a083340a09fea50459ac770da" version="04707e4492f243a18faeedbba9273913" lucid_version="U17.win.x64@2.80_10-16-2020(B)__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.80_10-16-2020(B) contains updates to the firmware packaging and is functionally equivalent to ver. 2.80_10-16-2020. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 2.80_10-16-2020.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.80_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000016 (CPUID 306F4) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a583c05eda574560bf7c625d7e1d2b1c" version="d3f46218eb43437d93dffbf731905471" lucid_version="MB2000JFDSL_MB4000JFDSN_x64@HPD4(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ecd26cd8b6e9412ba22bff66e6f6bbbe" version="4d580246b5014a83a13d919c48383413" lucid_version="MB6000JVYYV_ESXi@HPD2(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="30164e5ab9734a16a82806757516cba6" version="42cee8811e034924a99708f0138533c5" lucid_version="i38.vmware@2.80_10-16-2020(B)__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.80_10-16-2020 (B)&nbsp; contains updates to the component packaging and is functionally equivalent to ver. 2.80_10-16-2020.&nbsp; It is not necessary to upgrade with Revision B if a previous component Revision was used to upgrade the system ROM to version 2.80_10-16-2020.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.80_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2dc80c4ae4b943faadb938f8fc2b61d5" version="6b2d4f89498d49ffa23539d3dacc4619" lucid_version="iLO5.fwpkg@2.42__fwpkg-ilo_en"/>
      <revision_history>
        <revision>
          <version value="2.42" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>- Added Server Identity (iLO IDevID, iLO LDevID, System IDevID, System IAK and Platform certificates)&nbsp;<br />
&nbsp; capability to uniquely identify a server across networks that is cryptographically verifiable<br />
- EAP-TLS based authentication for onboarding into an 802.1X access-controlled network<br />
- Enabled support for Intel VROC</p>

<ul>
	<li>Device discovery and inventory of VROC SATA Controller and drives attached to it</li>
	<li>Firmware inventory of Intel VROC(VMD NVMe RAID) and VROC SATA Controller</li>
</ul>

<p>- Extend size for firmware versions supported to 48 bytes<br />
- Liquid Cooling support for Apollo systems<br />
- Server Platform Services Descriptor verification and recovery<br />
- Enabled Discovery, Inventory and Thermal support for Pensando Cloud Adapters</p>

<ul>
	<li>P41849-B21: Pensando DSP DSC-25 Cld-SP 10/25Gb Card</li>
	<li>P41852-B21: Pensando DSP DSC-100 Cld-SP 100Gb Card</li>
</ul>

<p>- For Synergy, restricted the capability to change below settings.</p>

<p>&nbsp; Note : Changes to these settings can affect communication between One-view and iLO</p>

<ul>
	<li>iLO Web service&nbsp;</li>
	<li>iLO Web service Non-SSL Port</li>
	<li>Web server SSL Port</li>
	<li>iLO RIBCL Interface</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>- Corrected Product Name listed under Device Inventory as &quot;NVIDIA Quadro M3000SE&quot;, that was wrongly listed as &quot;Synergy 75W MXM Mezzanine&quot; with iLO firmware v2.16 and higher<br />
- iLO stops monitoring the second Pensando card after the first one fails with a PCIe error<br />
&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.41" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support to import large sized LDAP CA certificate</li>
	<li>Support enablement for latest Intel Persistence Memory</li>
	<li>iLO GUI to display the Host Operating System Version</li>
	<li>Display platform Resiliency and Serviceability (RAS) policy in iLO GUI</li>
	<li>Added standard redfish schema support for Computer System &ndash; Reset, Graceful restart actions&nbsp;</li>
	<li>Real CPU temperature is reported in addition to normalized temperature (this feature requires ROM 2.40 version)</li>
	<li>Support for Active Health System logging by RDE ( Redfish Device Enablement ) enabled devices</li>
	<li>Support alerting feature for RDE ( Redfish Device Enablement ) enabled devices&nbsp;</li>
	<li>Ability to control LED for locating direct attached SATA drives</li>
	<li>Ability to reset power for direct attached SATA drives&nbsp;</li>
	<li>Added write protect setting feature for Liquid cooled Delta/Redstone GPU cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>iLO 5 reporting incorrect Power Supply count with iLO 5 v2.10</li>
	<li>Continuous logging to IML of a CHIF Error running ESXi with iLO 5 v1.46</li>
	<li>Random messages &quot;smad[]: No response from iLO for Hello&quot; seen in certain Operating Systems&nbsp;</li>
	<li>Incorrect MAC address shown in iLO for Synergy 4820C network adapter</li>
	<li>InfiniBand card not syncing with Oneview in iLO 5 v2.30</li>
	<li>Copy/paste may not work for more than 255 characters to VSP terminal in Linux platforms&nbsp;</li>
	<li>547FLR / 1100Q NIC may reset to default mode after flashing from 1.48 to 2.xx</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6973afa059034a93b5842e17d11d1b46" version="e3df114577d74e56a5747f7f7f41a0d4" lucid_version="MB012000GWDFE_ESXi@HPG2(F)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue during unaligned write commands, found in supplier ongoing lab testing.</li>
	<li>Includes additional fixes to improve error handling and reliability.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue during unaligned write commands, found in supplier ongoing lab testing. </li>
	<li>Includes additional fixes to improve error handling and reliability.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f4d825e16414547b68d00b94911e5eb" version="ea30c16ff7bc4046b0c6318940f901cd" lucid_version="ixt.w2k12_r2@3.14.214.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="3.14.214.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HPE Ethernet 10Gb 2-port 561FLR-T Adapter</li>
	<li>HPE Ethernet 10Gb 2-port 561T Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.14.78.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This driver corrects an issue which results in a link flap with the 1G passthru module.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="57f299c4757147d2a235078cf35bab3f" version="6d7ff4cfc466494a9ba7e95068a469c7" lucid_version="MB4000JEQNL_MB6000JEQNN_x64@HPDB(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDB (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f967d142bb1c4216acd867e7f8bae50f" version="a378825fe66744788c768c47029bc97e" lucid_version="hp-snmp-agents_sles15_x86-64@10.9.3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="10.9.3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed issue where the HPE Synergy 3820C 10/20Gb Converged Network Adapter was showing not supported</li>
	<li>Corrected invalid utf8mb4 char in database</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.9.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>&nbsp;the hp-snmp-agents service version 10.9.0 on an HPE ProLiant Gen9 Server or an HPE Synergy Gen9 Compute Node may experience a segfault after installation or restart of the hp-snmp-agents service. cmahostd or cmapeerd process will be killed after the segfault.&nbsp; Pleaer review customer advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00098957en_us" style="color:#0563c1; text-decoration:underline">a00098957en_us</a>&nbsp;for additional details.</li>
	<li>The OS version reported by hp-snmp-agents reported a&nbsp;mismatch with the newer Linux OS distros. i.e., &quot;SUSE Linux Enterprise Server 12&quot; v.s &quot;SUSE Linux Enterprise Server 12 SP5&quot;&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1c1d2de07cc24b02aa01d9c2dc7eff75" version="facd5adf8657465c873c7146ed4d249a" lucid_version="qlogic.online.fw.esxi67_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE 81Q 8Gb PCIe Fibre Channel Host Bus Adapter &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE 82Q 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE 84Q 8Gb Quad Port&nbsp;Fibre Channel Host Bus Adapter&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE SN1000Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
		<tr>
			<td>HPE SN1000Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1600Q 32Gb Single Port&nbsp;Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1600Q 32Gb Dual Port&nbsp;Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>02.04.07</td>
			<td>09.06.02</td>
			<td>7.11</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1610Q 32Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>02.04.07</td>
			<td>09.06.02</td>
			<td>7.11</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for 8 Gb,&nbsp;16 Gb and 32 Gb&nbsp;products.</p>

<ul style="list-style-type:square">
	<li>8Gb&nbsp;Fibre Channel Host Bus Adapter:
	<ul>
		<li>Package 3.82.00</li>
		<li>Firmware 8.08.207</li>
		<li>UEFI 7.00</li>
		<li>BIOS 3.56</li>
	</ul>
	</li>
	<li>16Gb&nbsp;Fibre Channel Host Bus Adapter:
	<ul>
		<li>Package 6.03.00</li>
		<li>Firmware 8.08.231</li>
		<li>UEFI 7.02</li>
		<li>BIOS 3.43</li>
	</ul>
	</li>
	<li>32Gb&nbsp;Fibre Channel Host Bus Adapter:&nbsp;&nbsp;
	<ul>
		<li>Package 02.03.06</li>
		<li>Firmware 09.04.01</li>
		<li>UEFI 7.08</li>
		<li>BIOS 0.0</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="594618f566cc4fbca055e8866278e53d" version="3019aa518f164960b4b42c32cf98e284" lucid_version="ssa.win_64@5.10.44.0__sc-windows_cn,de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.10.44.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Adding support&nbsp;to the HPE&nbsp;SR Gen10 Plus&nbsp;Controllers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="994a54e899fb4be5bf05bb0bf86539b6" version="1bf356abfa7e47fab27864dabc3774df" lucid_version="VO001920KWVMT_VO003840KWVMU_VO007680KWVMV_ESXi@HPK3__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Fixed SSD weargauge report error issue.</li>
	<li>Fixed Assign FWState as TR_DONE_ERR at the correct location.</li>
	<li>Prepare proper response data for Get Message Type Supported MCTP Command.</li>
	<li>Added code to preserve current feature values cross live firmware update.</li>
	<li>Allocate 4 bytes instead of 2 bytes for parameter code.</li>
	<li>Changed the value for NLB equal to NSize -1.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="86a63f267d0441379f1742c69a628a0a" version="9e004fd2f5ea46d7aedda966a4fdc9a2" lucid_version="HPE-CNA-FC-Emulex-Enablement.rhel7.x86_64@12.8.352.11__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.272.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 12.6.272.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d005de5acf9c47539dbd7a9056630a05" version="f3a6680b14944d469a11e4e632771b08" lucid_version="MO0400KEFHN_MO0800KEFHP_MO1600KEFHQ_x64@HPK4(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d0d15d83c7a84846a84195d46ef502f4" version="bd2c2b5bb3894999be9e6352b3ce9436" lucid_version="MLNX_VPI_Ethernet_Infiniband_HCA_FW_package.x64@1.0.12__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.12" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.11" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="be56d38accd045cca89d446f2db8440b" version="419d98ca460242a8ada1795c5f4e87b3" lucid_version="nicfwupg_intel.win64@5.2.4.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.2.4.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where Systems Insight Display (SID) modul is green when there&#39;s no Network connection.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.2.3.3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an WOL issue that system wakes up automatically if any magic packet being sent before system was shut down.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="809cff8704ac44759685c033bb7b76d3" version="5892d2443b2c431cb17ca21f254caa82" lucid_version="MB014000JWRTH_MB012000JWRTF_MB010000JWRTE_ESXi@HPD2(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="009bd5d739814a67a018565d835c45f1" version="01d7582900c84d1b96f4126d064bc284" lucid_version="u41.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5156ee2ce74d4685bd9c2931c6170220" version="e441334a8c094af18ed0fa94936d494b" lucid_version="iavf.sles15@4.0.2-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.0.2-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product now supports Suse Linux Enterprise Server 15 Service Pack 2</li>
	<li>This product now supports the following servers:</li>
</ul>

<p style="margin-left:80px; margin-right:0px; text-align:left">&nbsp;HPE Superdome Flex 280 &nbsp;<br />
&nbsp;HPE Superdome Flex Server &nbsp;<br />
&nbsp;HPE Superdome Flex 2&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.9.5-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dfa4f5ffa7ed4516ae9ccfcc7a2f5610" version="17a3ffb1fd7240aab9ba8ce0889e8fdf" lucid_version="qlogic_storport_x64.w2k12R2_bl@9.4.1.20(b)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="9.4.1.20" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version&nbsp;9.4.1.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.4.1.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version&nbsp;9.4.1.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>Memory dumps were not generated during a crash dump in a boot from SAN environment</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="40030df85c9d48d0a9446bc064913506" version="9cf4d858a17742ca9574b18c8c279ffe" lucid_version="emulex_storport_x64.win_2012R2_rt@12.8.334.6__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.334.6" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;12.8.334.6</p>

<p>The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9955e8989d3a49ccb377a1c01a7b8a6c" version="8b21ac89b6974270b137e988ace5c8fc" lucid_version="EG001800JWJNR_EG002400JWJNT_x64@HPD5(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="61f59cb79a694ca78cfec9d06ac2ad97" version="13095de5299a4e97b38dcb58cb035af0" lucid_version="H240ar_H240_H244br_P244br_P440ar_P440_P840_x64@7.00__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="7.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add optimization for the iLO communication interface in order to have a more effective mechanism to check for ownership of the communication buffer</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Occasionally&nbsp; the drive will not accept any IO&rsquo;s after running Sanitize command for a period of time due to the FW being out of sync with the drive during that time</li>
	<li>Non-HPE drives could report &ldquo;Task Set Full&rdquo; due to the drives reaching the qdepth limit during heavy workload</li>
	<li>Raid volume is not discovered due to a bad drive consuming two slots during hotplug</li>
	<li>Data could become inaccessible when upgrading from&nbsp;firmware versions prior to 4.5x</li>
	<li>The controller could stop responding when executing a SCSI verify command due to a CPU exception</li>
	<li>The system could stop communicating due to an I/O command timeout</li>
	<li>While on HBA mode, a drive could stop responding due to an early allocated buffer release</li>
	<li>A SAS drive WWN is reported inaccuratelyy due to an incorrect report causing the driver to be out of sync with the device</li>
	<li>If using a 4G module, the controller could stop responding due to the SSD Cache metadata exceeding its limits during a Backup</li>
	<li>SSD Smart Cache module become disabled due to a reduction in usable cache space</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.88" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixes the following Issues</p>

<ul>
	<li>SATA drive could stop responding&nbsp; while on HBA mode when non-NCQ commands are executed</li>
	<li>Controller could stop responding when upgrading due to the DDR Cache Module exceeding its limitations</li>
	<li>SSD Cache module could become disable while upgrading FW</li>
	<li>Data from the HPE Smart Drive Backplane could potentially become corrupted if a non-HPE carrier is present</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="25298d41e8ae4c7a847f78be945ec24d" version="b3f0ee44d73545adbb43a4d7342c6593" lucid_version="MB001000GWFWK_MB002000GWFWL_ESXi@HPG6(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0134d053d49b43b1add04e5a51f6ff18" version="bb1e83128a8e4556889d9489daabe456" lucid_version="nicfwpkg_intel_e810_xxv2@2.24__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="2.24" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial version</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="09591d5b70d148ae85b720d091645e6c" version="e1817901830848a0aea1e2e157a47a7a" lucid_version="be2net.sles12.x86_64@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 12 Service Pack 5</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1280.17-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b208c604a379445cb8f4da716ed6946e" version="015058df8dd54917b886990bccb64ae3" lucid_version="MLNX_VPI_Ethernet_Infiniband_HCA_FW_package.esxi70@1.0.1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="edfc3fe1db664c19ac762129db3cbadb" version="4abfb09f812d43539bc2655a0a480cf7" lucid_version="elx-nvmefc-connect@12.8.264.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.8.264.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 12.8.264.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c08d6e9a714b4bcab51975dad9f3ab91" version="bdc3c603bf5c470b8f6dd68a72671f8f" lucid_version="be2net.sles15@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 12 Service Pack 2</p>

<p>This product now supports elx_net_install.sh&nbsp;installation script to install be2net driver on SUSE Linux Enterprise Server 12 Service Pack 1 or later.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1280.17-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8c2e806c31134d5f896832d57e01f96c" version="b56608aaf90d46d29365913fd7ff466a" lucid_version="EH0300JDXBA_EH0450JDXBB_EH0600JDXBC_x64@HPD5(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b9dda486435f4c78a30de5b1c831c135" version="066445f8d85d44ecb6263bf017624a40" lucid_version="Apollo_4200_Gen10_Plus.Win@0.37__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="0.37" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f68792033b364ab4b274dc849cf93dea" version="1f7a14b7d04142f0b04ecb9c031caae8" lucid_version="nicfwupg_qlflq.vmware@4.13.50__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="4.13.50" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains support PLDM firmware upgrade base improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.13.8" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains support PLDM firmware upgrade base improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4168bdd100e94b7997ab17226da297b5" version="eccf0822da0e4814874cadd59a619712" lucid_version="qlogic.online.fw.esxi70_bl@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for&nbsp;16 Gb&nbsp;products.</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE QMH2672 16Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for 8 Gb and 16 Gb&nbsp;products.</p>

<p>&nbsp;</p>

<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1" style="width:800px">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td style="width:50px">UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE QMH2572 8Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE QMH2672 16Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>16Gb</td>
			<td>6.03.00</td>
			<td>8.08.231</td>
			<td>7.02</td>
			<td>3.43</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>Enhancements have been made to the firmware to prevent and better recover from the unexpected behavior described in Customer Advisory titled: &ldquo;HPE ProLiant, Synergy and Superdome Flex Host Bus Adapters (HBA) - Certain Fibre Channel HBA Firmware May Cause the Operating System to Halt and Potentially Compromise Filesystem Data Integrity&quot; at the following link:</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us</a></p>

<ul>
	<li>Address unexpected behavior when Fibre Channel adapters were simultaneously running traffic to an array which supports 3PAR Persistent Checksum AND another array which is running T10-PI (also known as T10-DIF) or no block checksum technology at all</li>
	<li>Fibre Channel adapter firmware versions were not showing up as expected in the AHS log.</li>
	<li>Port statistics counters would sometimes not update in the event of Loss of Signal or Loss of Sync</li>
	<li>link downs would occur during specific frame sequences used by the HPE XP8 array after array-side link loss</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="70cd98996b234f1990b49a33858ae471" version="72e53b95725f4784b2b79f0e2cf85b01" lucid_version="MB010000GWAYN_MB008000GWAYL_x64@HPG5(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.Â </li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (D)" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing. </li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e6fc00ad6a3e4c539778e7419a9fafa6" version="0e4aff80593f446a8b1e0790214b369a" lucid_version="FWPKG-P31323-B21@20.29.1016__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.29.1016" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New Features and Changes in Version 20.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.</li>
	<li>To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.</li>
	<li>Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.</li>
	<li>Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.29.1016:</strong></p>

<ol>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ol>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c697574afe4243919c63d77cce675260" version="5ff02e6335e649ee8ebc17d9d057f666" lucid_version="hpemrsa.linux_x64@7.016.16.0__pubsw-linux_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="7.016.16.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Gen10+ MegaRAID Controllers.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.113.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Release</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fae7c963a551489594d913b81c29f2a4" version="5ea6b6a68f2c4dda9aee82ef6c7ab252" lucid_version="PICGen10.FWPKG@1.0.7(D)__fwpkg-power_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.7" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.7 (D) contains updates to the component packaging and is functionally equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (D) if a previous component revision was used to upgrade the firmware to ver. 1.0.7. This is the initial version for HPE Gen10 Plus servers.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is required to enable the support. iLO5 version 1.40 or above is required to upgrade to this version.</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the support. This version of firmware does not include any changes for AMD EPYC 7001 Generation Processors. iLO5 version 1.40 or above is required to upgrade to this version.</p>

<p>This is the initial version for HPE Gen10 Plus servers.</p>

<p>Added support for VMware ESXi 7.x on AMD Gen10 and Gen10 Plus servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.7 (c)" revision="c" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.7 (C) contains updates to the component packaging and is functionally equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (C) if a previous component revision was used to upgrade the firmware to ver. 1.0.7. This is the initial version for HPE Gen10 Plus servers.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is required to enable the support. iLO5 version 1.40 or above is required to upgrade to this version.</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the support. This version of firmware does not include any changes for AMD EPYC 7001 Generation Processors. iLO5 version 1.40 or above is required to upgrade to this version.</p>

<p>This is the initial version for HPE Gen10 Plus servers.</p>

<p>Added support for VMware ESXi 7.x on AMD Gen10 and Gen10 Plus servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="62c5be0602154ae6afbf730b5a1cb394" version="5fdf7ff86d1e43c99731e639564cb828" lucid_version="EG000600JWFUV_EG001200JWFVA_x64@HPD3(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c1bd991a7a664214ab29388b7b63a963" version="f7c5708b9400487cbac2b9b942488a5f" lucid_version="Apollo_2000_Gen10.Esxi@1.00(C)-rev1__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.00" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware vSphere 6.7 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.00 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware vSphere 6.7 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1d291170bb0944cd8d58e9257151b0f1" version="1ca881a856d34b76ba8844d131eb4a1b" lucid_version="MO000400JWFWN_MO000800JWFWP_MO001600JWFWQ_ESXi@HPD5(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d33174a587ab4b3ea4d5e4e22de786d1" version="cde6f86cc9f541eea24deb6d37680074" lucid_version="MB006000GWKGR_x64@HPG1(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="690ed2c76a80449da0cbf178bbdf3cd5" version="90b701c5b1854b38b389070c71929094" lucid_version="netxtreme2_bl.rhel7@7.14.76-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="7.14.76-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7, Updates 8 and 9.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue where the driver fails to load in NPAR mode when RoCE Data Center Quantized Congestion Notification (DCQCN) is enabled.<br />
This product addresses a system crash seen when unloading and reloading the RoCE driver only.<br />
This product addresses a system crash seen during multiple reboots of virtual machines using VFs and RDMA.<br />
This product addresses a system crash seen when injecting a fw_assert on a NIC PF.<br />
This product corrects an issue where a system fails to shutdown after reboots in iSCSI BFS.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.14.63.1-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers correct an issue where iSCSI target discovery fails to complete when booting from SAN or a local HD.</p>

<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fbb06cc4248449e08cfdf0ed7c07c5e1" version="c3bd2ddda8974abeb9ccc98ffbd1cf68" lucid_version="MK0960GECQK_ESXi@HPG3(K)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="K" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (J)" revision="J" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Firmware fixes intermittent data corruption issue associated with unaligned sequential write operations.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4f235836a2c34b2fb5610223cd1b694c" version="14254ac5d34d468d8c0b7864fcb20f05" lucid_version="hpsa.sles15.x86_64.rpm@3.4.20-197__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.4.20-197" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added Support for SUSE Linux Enterprise Service 15.2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.4.20-170" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for SUSE Linux Enterprise Services15 SP1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="13652737a6ea4ec4a4913fd807c0a85c" version="6ed0efa36bef4611a824cc29ad9f9e36" lucid_version="VO0480JFDGT_VO0960JFDGU_VO1920JFDGV_x64@HPD9(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ec5fd859b967489ab6f67ad677712984" version="f3659de9604b42298c5b5a35bd9d799b" lucid_version="EH000900JWCPH_EH000600JWCPF_ESXi@HPD8(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update improves performance for random read workloads with delays between reads.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="75970c81b36f443fbbff409af0bea2a1" version="3e759217e0774b618e735d5c2a45f595" lucid_version="MB2000GCWLT_MB3000GCWLU_MB4000GCWLV_x64@HPG4(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9141b4ee76c74b70a4eb2f021bfa217f" version="0e62221aeaef40c98fa8ba0904b0a6ea" lucid_version="VO000960JWTBK_VO001920JWTBL_VO003840JWTBN_x64@HPD7(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="78fdd206c60e4542b98f133555e58070" version="6b70ef236ccf41b09c0dea4ba1fb2d63" lucid_version="bnxt_roce.rhel8u0@216.0.88.3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="216.0.88.3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now disables loading RoCE driver on VFs when Link Aggregation is enabled</li>
	<li>This product now supports rdma-core v22&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue which RoCE bond is not getting created automatically after system reboot</li>
	<li>This product corrects an issue which errors/performance may degrades after hot plug operation is performed<br />
	&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="214.0.190.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0da1225b30784f8690bf763f9cc09498" version="69035a420f894c64b4387ccd55aafc1b" lucid_version="I41.linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a2bc84f793fd4972b6196baf3df85eb6" version="16ec643c9cec47898d4ea4bfcb10b7ca" lucid_version="MB014000JWUDB_ESXi@HPD2(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2d670e4a587b4b0daab7ed709579acb1" version="c101ff3dbf7d4311aa9101280a6f3a26" lucid_version="P86.VMware@2.80_10-16-2020__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px"><strong>Important Notes:</strong></p>

<p style="margin-left:0px; margin-right:0px">Ver. 2.76_10-21-2019 (B)&nbsp; contains updates to the component packaging and is functionally equivalent to ver. 2.76_10-21-2019.&nbsp; It is not necessary to upgrade with Revision B if a previous component Revision was used to upgrade the system ROM to version 2.76_10-21-2019.</p>

<p style="margin-left:0px; margin-right:0px"><strong>Firmware Dependencies:</strong></p>

<p style="margin-left:0px; margin-right:0px">None</p>

<p style="margin-left:0px; margin-right:0px"><strong>Problems Fixed:</strong></p>

<p style="margin-left:0px; margin-right:0px">This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-0151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p style="margin-left:0px; margin-right:0px"><strong>Known Issues:</strong></p>

<p style="margin-left:0px; margin-right:0px">None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d5fee9f753d04f3ba9583fdfe0002842" version="e0586f2f71b64c14a2e61ad4373c3019" lucid_version="EG0600JETKA_EG0900JETKB_EG1200JETKC_ESXi@HPD7(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4af400bbe27947109ef9222bacd0d2fd" version="51edc3e8ce5e4b15a197316085ddafe6" lucid_version="elxnet_bl.vmware65@2020.03.09__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.03.09" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects&nbsp;a vmnic flapping issue which impacts network&nbsp;connectivity.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.12.20" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4fd1e8e4a27347cd8d83d1e63d9eb38e" version="a826a84bd01240d4b274abf85946e3f0" lucid_version="MB006000GWKGR_x64@HPG1(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eb945575db8f48b5a4d14fa2a05d3f58" version="4368d6a7a48c448c8f9f6e94a7795a41" lucid_version="NVMe_Backplane_PIC.win.x64@8.4(E)__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="8.4" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.4 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Resolved an information disclosure vulnerability issue; ref: CVE-2017-8992</li>
</ul>

<p style="margin-left:40px"><strong>Note:</strong>&nbsp;If&nbsp;version 8.4 was previously installed, then it is not necessary to upgrade to version 8.4 (D).</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d4fc4da3121749de965df405cffc318e" version="fef7db202a014e2da3d785db5c7b58f0" lucid_version="MLNX_Ethernet_Only_NIC_MFT_FW_package.esxi65@1.0.4-rev1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device is&nbsp;updated to 14.29.1016:</strong></p>

<p>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</p>

<p><strong>Following New features and Changes are included in version 14.29.1016:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in version 14.29.1016:</strong></p>

<ul>
	<li>An issue that caused the sent packet to hang while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>A rare case where the the device froze&nbsp;while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance while using the VSC to trigger the send_ring_doorbells.</li>
	<li>An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.</li>
	<li>An issue that caused the fragmented IP packets to drop was fixed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device is&nbsp;updated to 14.28.xxxx:</strong></p>

<p>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</p>

<p><strong>Following New features and Changes are included in version 14.28.xxxx:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in version 14.29.1016:</strong></p>

<ul>
	<li>An issue that caused the sent packet to hang while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>A rare case where the the device froze&nbsp;while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance while using the VSC to trigger the send_ring_doorbells.</li>
	<li>An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.</li>
	<li>An issue that caused the fragmented IP packets to drop was fixed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8ffd589c0d3c4586b8af1c72d7c3699f" version="1824ac7d10e9455caccab3153f92fd2f" lucid_version="VO001920KWVMT_VO003840KWVMU_VO007680KWVMV_x64@HPK3__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Fixed SSD weargauge report error issue.</li>
	<li>Fixed Assign FWState as TR_DONE_ERR at the correct location.</li>
	<li>Prepare proper response data for Get Message Type Supported MCTP Command.</li>
	<li>Added code to preserve current feature values cross live firmware update.</li>
	<li>Allocate 4 bytes instead of 2 bytes for parameter code.</li>
	<li>Changed the value for NLB equal to NSize -1.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="28492eec99964c7884a778af5a393aa1" version="c924ae49269f4d53b93dbb5ac5a0603c" lucid_version="nicfwupg_qlflq_open.win64@5.2.4.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.2.4.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supported NPAR enabling option.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product contains support PLDM firmware upgrade base improvements.</li>
	<li>This product addresses an overheat issue on the network adapters as below,</li>
</ul>

<p style="margin-left:80px">HPE Ethernet 10Gb 2-port BaseT QL41132HLRJ Adapter<br />
HPE Ethernet 10Gb 2-port BaseT QL41132HQRJ OCP3 Adapter</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.2.3.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue of inconsistent LED behavior while linking up with different speed.</li>
	<li>This product corrects an issue about failing to restore the factory default value by pressing F7.</li>
	<li>This product addresses an issue where driver doesn&rsquo;t load upon booting up by correct memory relocation.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cef186d7aeff4c8eb2518a5d81c00613" version="58284ae214af415c9547f8c8ddca851f" lucid_version="ilo3ci.win2016.x64@4.1.0.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Corrected a potential Windows bugcheck 0x50 (PAGE_FAULT_IN_NONPAGED_AREA) that could occur if Windows restarts the driver without unloading it.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.0.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Windows Server 2019.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="efbcca27fdf947149d2bf0ed9f4fb6db" version="24955e8cb0a24fb2acdd537b545f5af0" lucid_version="hpsmh_x64.win@7.6.6.2__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="7.6.6.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the following components:</p>

<ul>
	<li>&nbsp;&nbsp;&nbsp; Apache to version 2.4.41</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.6.3.3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><br />
Updated the following components:</p>

<ul>
	<li>PHP to version 5.6.30</li>
	<li>Zlib to version 1.2.11</li>
	<li>Libxslt to version 1.1.32</li>
	<li>PCRE to version 8.41</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="86e4b3a553494874939d56f97075cb67" version="cf72dc2669f74c42816776cc86d25202" lucid_version="be2iscsi_bl.sles15@12.0.1342.0-1(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 15 SP2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>These drivers have been&nbsp;updated to maintain compatibility with the latest firmware.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8bba948f5c6540eba0ebe40d14f02daf" version="6e2aca9aaeff443e8ba147dbf8be1528" lucid_version="hpe-nfc-agent-sles@1.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.0-1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Version</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ce1fbf38afa940d590b86cded0a4b8a1" version="49ae20d0938846e8ac471a7291d80175" lucid_version="EH0600JDYTN_ESXi@HPD7(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a data integrity risk where stale data is mistakenly used from cache.</li>
	<li>Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.</li>
	<li>Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.ÃÂ </li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (F)" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a data integrity risk where stale data is mistakenly used from cache.</li>
	<li>Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.</li>
	<li>Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.Â </li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="80d81c90aa4043f99c110cbf04419c83" version="7eea3d0d76d542e1a9e9f0ddd51dbb40" lucid_version="MLNX_Ethernet_Only_NIC_FW_package.esxi65@1.0.9__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.9" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5044 :</strong></p>

<p>&nbsp; &nbsp;779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)<br />
&nbsp; &nbsp;779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.29.1016:</strong></p>

<p>&nbsp; &nbsp;817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.29.1016:</strong><br />
&nbsp; &nbsp;817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</p>

<p><strong>Firmware for the following device is updated to 16.29.1016:</strong></p>

<p>&nbsp; &nbsp;874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</p>

<p><strong>New features and changes in version 14.29.1016:</strong></p>

<p style="margin-left:40px">Added support for the following features:</p>

<ul>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>cq_overrun counter: This counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p><strong>New features and changes in version 16.28.1016:</strong></p>

<p style="margin-left:40px">Added support for following features:</p>

<ul>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Steering DP hash flow groups.</li>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>PCIe Rx modifications to prevent the adapter cards from disappearing from the system.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
	<li>cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>[Beta]&nbsp;Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>ixes submitted in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) &nbsp;NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that caused&nbsp;packets to drop due to header size issues and/or failing checks. The issue was caused due to a Linux issue that caused&nbsp;VFs to set the wrong header size value in wqe_inline_header_mode input.</li>
	<li>When MKEY_BY_NAME was&nbsp;enabled by NVCONFIG and a large number of VFs were configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>&nbsp;An issue that caused&nbsp;the device to go to dead IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.&nbsp;</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>&nbsp;An issue that prevented&nbsp;VXLAN packets with svlan/ cvlan tag from being matched.</li>
	<li>The&nbsp;eth_wqe_too_small counter to count&nbsp;ODP page used to fail.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>An issue that resulted in low performance after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.</li>
	<li>An issue that caused&nbsp;the device to go to dead IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5044 :</strong></p>

<p>&nbsp; &nbsp;779799-B21 (HP Ethernet 10G 2-port 546FLR-SFP+ Adapter)<br />
&nbsp; &nbsp;779793-B21 (HP Ethernet 10G 2-port 546SFP+ Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.27.4000:</strong></p>

<p>&nbsp; &nbsp;817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.27.4000:</strong><br />
&nbsp; &nbsp;817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</p>

<p><strong>Firmware for the following device is updated to 16.27.2008:</strong></p>

<p>&nbsp; &nbsp;874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</p>

<p><strong>New features and changes in version 16.27.2008:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New features and changes in version 14.27.4000:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction:
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes submitted in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.27.4000:</strong></p>

<ul>
	<li>The sent packet hung while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>The completions (CQ)completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.&nbsp;</li>
	<li>The fragmented IP packets were dropped.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a1ae47134c0e4b378bbf0bb2397b9e93" version="ea73ab010f9c451db16cdcf52a0343da" lucid_version="emulex_fcoe_x64.win_rt@12.0.1192.0(e)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1192.0" revision="e" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Updated to driver version 12.0.1192.0</p>

<p>Removed the raw driver file folder.&nbsp; The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:<br />
<br />
&nbsp;&nbsp;&nbsp; brcmdrvr-fcoe-version.exe /q2 extract=2<br />
<br />
The extracted files are located:<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version<br />
<br />
Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version\x64\win2012</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1192.0 (c)" revision="c" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Updated to driver version 12.0.1192.0</p>

<p>Removed the raw driver file folder.&nbsp; The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:<br />
<br />
&nbsp;&nbsp;&nbsp; brcmdrvr-fcoe-version.exe /q2 extract=2<br />
<br />
The extracted files are located:<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version<br />
<br />
Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version\x64\win2012</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<table>
	<tbody>
		<tr>
			<td>
			<ul>
				<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
			</ul>
			&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></td>
		</tr>
	</tbody>
</table>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5e67b3914b754070a44558f816a7dbab" version="ba7c3ec561b9456ba9f23f1d36a9b5ee" lucid_version="intel_cvl.w2k19@1.5.74.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.5.74.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5f15a26843724cddbeb0234b8805431e" version="9499ad761fdf44d19a561f604fb4fb64" lucid_version="qlogic.online.fw.esxi70_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE 81Q 8Gb PCIe Fibre Channel Host Bus Adapter &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE 82Q 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE 84Q 8Gb Quad Port&nbsp;Fibre Channel Host Bus Adapter&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE SN1000Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
		<tr>
			<td>HPE SN1000Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1600Q 32Gb Single Port&nbsp;Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1600Q 32Gb Dual Port&nbsp;Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>02.04.07</td>
			<td>09.06.02</td>
			<td>7.11</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1610Q 32Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>02.04.07</td>
			<td>09.06.02</td>
			<td>7.11</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for 8 Gb,&nbsp;16 Gb and 32 Gb&nbsp;products.</p>

<ul style="list-style-type:square">
	<li>8Gb&nbsp;Fibre Channel Host Bus Adapter:
	<ul>
		<li>Package 3.82.00</li>
		<li>Firmware 8.08.207</li>
		<li>UEFI 7.00</li>
		<li>BIOS 3.56</li>
	</ul>
	</li>
	<li>16Gb&nbsp;Fibre Channel Host Bus Adapter:
	<ul>
		<li>Package 6.03.00</li>
		<li>Firmware 8.08.231</li>
		<li>UEFI 7.02</li>
		<li>BIOS 3.43</li>
	</ul>
	</li>
	<li>32Gb&nbsp;Fibre Channel Host Bus Adapter:&nbsp;&nbsp;
	<ul>
		<li>Package 02.03.06</li>
		<li>Firmware 09.04.01</li>
		<li>UEFI 7.08</li>
		<li>BIOS 0.0</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e73b53ae478842daa9ba4db7eebbb5d9" version="ff093ea8bb8044479b111b93d7be75ee" lucid_version="Apollo_45xx.Lin@2.50__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="2.50" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>&nbsp;Expander may reset during heavy SSACLI polling</li>
	<li>SATA drives may take longer to spin up, not be initially detected, and then hot add later. This can prevent system boot or affect the logical drive status.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.08 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SUSE Linux Enterprise Server 15</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="45e5e3b4b5524afa8388b9297cf98327" version="68feffecfa7c4ed787894a1cbe74c572" lucid_version="nmlx5_en.vmware70@2020.11.11__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.11.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>No Changes and New Features are included&nbsp;in smart component version 2020.11.11:</strong></p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p><strong>New features and changes in version 4.19.70.1:</strong></p>

<ul>
	<li>
	<p>Disabled the option of shutting down the link due to power limitation.</p>
	</li>
	<li>
	<p>Support for trusting Differentiated Services Code Point (DSCP) and setting default value for RoCE traffic.</p>
	</li>
	<li>
	<p>New counter that enables the user to query per Virtual Function counters.</p>
	</li>
	<li>
	<p>RX out-of-buffer counter to indicate any lack of software receive buffers.</p>
	</li>
	<li>
	<p>support for Data Center Bridging Capability Exchange (DCBx) protocol.DCBX works with LLDP to allow switches to exchange information about their Data Center Bridging (DCB) capabilities and configuration and automatically</p>

	<p>negotiate common Priority-Based Flow Control (PFC) parameters.</p>
	</li>
	<li>
	<p>Module parameter to enforce specific RoCE version.</p>
	</li>
	<li>
	<p>Support for setting the minimal bandwidth guarantee for traffic classes (TCs).</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No&nbsp;fixes are included in&nbsp;version 4.19.70.1:</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.05.26" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>No Changes and New Features are included&nbsp;in smart component version 2020.05.26:</strong></p>

<p>&nbsp;</p>

<p>&nbsp;</p>

<p><strong>New features and changes in version 4.19.70.1:</strong></p>

<ul>
	<li>
	<p>Disabled the option of shutting down the link due to power limitation.</p>
	</li>
	<li>
	<p>Support for trusting Differentiated Services Code Point (DSCP) and setting default value for RoCE traffic.</p>
	</li>
	<li>
	<p>New counter that enables the user to query per Virtual Function counters.</p>
	</li>
	<li>
	<p>RX out-of-buffer counter to indicate any lack of software receive buffers.</p>
	</li>
	<li>
	<p>support for Data Center Bridging Capability Exchange (DCBx) protocol.DCBX works with LLDP to allow switches to exchange information about their Data Center Bridging (DCB) capabilities and configuration and automatically</p>

	<p>negotiate common Priority-Based Flow Control (PFC) parameters.</p>
	</li>
	<li>
	<p>Module parameter to enforce specific RoCE version.</p>
	</li>
	<li>
	<p>Support for setting the minimal bandwidth guarantee for traffic classes (TCs).</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No&nbsp;fixes are included in&nbsp;version 4.19.70.1:</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="134da74460bf4b5aa8511e630ba5a272" version="f5940b85bb0f4f508bfc58c76930c885" lucid_version="MicroServerGEN10PlusSPS.fwpkg@05.01.04.208__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.208" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.113" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This image contains the latest Intel Server Platform Services (SPS) Firmware which contains mitigations for a variety of security vulnerabilities. The following vulnerabilities have been addressed in this SPS release: CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b5c5978ca68a42089c65763237c54346" version="8dae361972e3442d876b0dde42972685" lucid_version="VK000960JWSSQ_VK001920JWSSR_VK003840JWSST_x64@HPD8(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (B)" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="637d540b39214addb4d18ef0c3a8cbbf" version="34bf979025e44dc3851a5dd91737e087" lucid_version="MLNX_VPI_Ethernet_Infiniband_HCA_FW_package.x64@1.0.0.12__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.12" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.11" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a696c5bfe8e646f9a237f7c9cfde41c1" version="638ce062f75648068866f21f5aaffa14" lucid_version="be2_bl.w2k19@12.0.1195.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1195.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b196e6e9412f4744bd940867ff7e2b2a" version="bfa05a001f3d44ed9cfcf192e7d8c96b" lucid_version="hp-health_sles12_x86-64@10.9.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="10.9.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>TBD</li>
	<li>TBD</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.9.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Modified the loop initial values in hpasmcli from 2 to 0.</li>
	<li>Modifications to check the read and write variables to match RBSU in Legacy and UEFI mode</li>
	<li>Updated the hpasmcli check string to correctly report the impitool information.</li>
	<li>Remove the redundant serial embedded and com ports</li>
	<li>Addressed&nbsp;IML message size limitation from 36 to 212 bytes</li>
	<li>Support for hp-health in OS security boot</li>
	<li>Added supporting &ldquo;quote mark&rdquo; in SET NAME command</li>
	<li>Enabled to set PXE as boot first&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0e95d953f6c341e2ab45544cad6adaa1" version="0dbf7497802347b9a3d62ee6eed74dd9" lucid_version="U33.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="81e371ec59e54de18ebca5fd69821033" version="dff5fe5f311243fb88329b86fbcd9f04" lucid_version="MB002000GWFGH_MB001000GWFGF_x64@HPG3(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="G" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (F)" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2339c17ea9cc43149a8dccb1a0ff379a" version="35f5b59f662b462fae78d81b1bdb2cac" lucid_version="mlnx_mft.rhel8u2.x86_64.rpm@4.16__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.15" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2a7080d78048494dac265180eef80ae1" version="480f1c6cad16406fa7b2bba740fc045b" lucid_version="EG000300JWBHR_ESXi@HPD4(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c9be2188c9e74afcbe220603b395a9de" version="b0207fb074524603989f1a74cd1603c6" lucid_version="p85.vmware@2.80_10-16-2020(B)__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.80_10-16-2020(B) contains updates to the component packaging and is functionally equivalent to ver. 2.80_10-16-2020. It is not necessary to upgrade with Revision (B) if a previous component revision was used to upgrade the firmware to 2.80_10-16-2020.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.80_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9927526d75db4a7cba662ab57f85142d" version="ab99ef45554b4bb39a66f33a98247a6b" lucid_version="tg3sd.linux_x86_64@1.0.21-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.0.21-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product adddresses a library dependency issue seen when installing&nbsp;on a system running SUSE Linux Enterprise Server 15.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.20-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>SUM no longer attempts to install this product on Gen10 servers, which this product&nbsp;does not support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fc28c0050f9d4a8a94e83f990b230b39" version="302e50c98c034815b721393b01e8b8a3" lucid_version="VS000480KXALB@85030G00(C)__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="85030G00" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dceed791e6be42c1ba1f138aa6af8451" version="fa97b606ff334d348d1c86647d5275db" lucid_version="MB1000GDUNU_MB2000GDUNV_MB3000GDUPA_MB4000GDUP_x64@HPG4(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="07fc1a5a961a427ba3c2e3f341d3886e" version="cd70587982ba46b7a4ec1621f047e38f" lucid_version="MB004000JWFVK_MB006000JWFVL_x64@HPD3(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9635a1b56d544167b79937e43283b144" version="60f1eeba19364474aba032aeccbbaa16" lucid_version="MB1000GDUNU_MB2000GDUNV_MB3000GDUPA_MB4000GDU_ESXi@HPG4(J)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="896ea0712e9c4853949ccb47860e6c63" version="a607c64dc4e24919959f820b7b1b20d7" lucid_version="EO000400JWDKP_EO000800JWDKQ_EO001600JWDKR_x64@HPD2(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1cf7a310ab4d4c49af4f9d9368690f44" version="919054f32bcb4beaad1c56bed50c230a" lucid_version="emulex_storport_x64.w2k19_bl@12.8.334.6__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.334.6" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;12.8.334.6</p>

<p>The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.165.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version&nbsp;12.6.165.0&nbsp;&nbsp;&nbsp;</p>

<p>Added the following support :</p>

<p><br />
Removed the raw driver file folder.&nbsp; The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:</p>

<p>&nbsp;&nbsp;&nbsp; elxdrvr-fc-version.exe /q2 extract=2</p>

<p>The extracted files are located:</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version</p>

<p>Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,</p>

<p>&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Emulex\Drivers\FC-version\x64\win2019</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>Hyper-V Virtual Machines (VMs) could not access storage arrays if those Virtual Machine (VM) had been shut down and restarted over 512 times.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="386613fae09d49a9a12412011f349ab9" version="7fafbccf73f544149a7288af9db8da43" lucid_version="nhpsa.esxi6.5_bundle@2021.01.01-rev1__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.01.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This release provides the following fixes:</p>

<ul>
	<li>Fix failed TUR cmds hung in queue</li>
	<li>Fix internal cmd reservation broken</li>
	<li>Update for new version number scheme</li>
	<li>Fix verbose error messages on common innocuous errors<br />
	&nbsp;</li>
	<li>Failed logical volumes not being properly handled via offline state.</li>
	<li>Scsi sense and status returns are incorrect for some error conditions.</li>
	<li>Incorrect &#39;unavailable&#39; status seen during hot-plug recovery.</li>
	<li>Displayed target ID is incorrect in some driver log messages.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2021.01.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>To add OS support for VMware ESXi 7.0 U1 P02</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This release provides the following fixes:</p>

<ul>
	<li>Fix failed TUR cmds hung in queue</li>
	<li>Fix internal cmd reservation broken</li>
	<li>Update for new version number scheme</li>
	<li>Fix verbose error messages on common innocuous errors<br />
	&nbsp;</li>
	<li>Failed logical volumes not being properly handled via offline state.</li>
	<li>Scsi sense and status returns are incorrect for some error conditions.</li>
	<li>Incorrect &#39;unavailable&#39; status seen during hot-plug recovery.</li>
	<li>Displayed target ID is incorrect in some driver log messages.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="19bf97ce78cd46209fcfdc12bd9d7a9f" version="85125e14c7ed4c99a5deb7027e05e5fd" lucid_version="hpdsa.esxi6.5_bundle@2019.05.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2019.05.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixes an issue where the driver will not upgrade due to the AHCI driver taking priority.</p>

<p>&nbsp;</p>

<p>This issue is only encounter when upgrading to version 2018.10.18 (5.5.0.66-1). All other versions are not affected.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2018.10.18" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixes an issue where the driver could report excessive errors in the debug log.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="17be7af3223241a4bef4e8f0da8afac5" version="2a552d4380f242a089ee2298e95441c3" lucid_version="MK000480GWSSC_MK000960GWSSD_MK001920GWSSE_x64@HPG3(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>PrefetchClear logic error on Write CMD.</li>
	<li>ICRC Data Integrity improvement.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4449ff05e7054e05a09904ed0fed74a8" version="11a8ca6bd9b948daa9e049fbb7fe0c54" lucid_version="bnxt.sles12.x86_64@1.10.2-218.0.67.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.10.2-218.0.67.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports PAM4 speeds information in&nbsp;ethtool tools&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses an issue where system crashed on doing driver unload load in loop when running broadcast traffic</li>
	<li>This product addresses an issue where bnxt_en module crashes with NULL pointer deference before ifup(bring up network interface)</li>
	<li>This product addresses an issue where kernel panic after PCIe AER(Advanced Error Reporting) device recovery successful</li>
	<li>This product addresses an issue where bnxt_en crashes with NULL pointer dereference when enabling SRIOV</li>
	<li>This product correct an error where ethtool -S tx_bytes and rx_bytes counter values far exceed actual values</li>
	<li>This product correct an error message when querying hwmon temperature on VF via sysfs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.10.1-216.0.169.4" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports SUSE Linux Enterprise Server 12 Service Pack 5.</li>
	<li>This product now sets Maximum Transmission Unit(MTU) default value from firmware returned value.</li>
	<li>This product now not support user establishing connections using RDMA communication manager(CM) when Priority-based Flow Control (PFC) configured VLAN ID is 0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue which offload is not happening on bond(vf and virtio) interface after the fail over with VF as the active slave</li>
	<li>This product corrects an issue which driver loading failed on kdump kernel.</li>
	<li>This product corrects an issue which RoCE driver causes input&ndash;output memory management unit(IOMMU) warnings</li>
	<li>This product corrects an issue which RoCE Link Aggregation (RoCE LAG) when Maximum Transmission Unit(MTU) was changed.</li>
	<li>This product corrects an issue which Link up failed after resuming from hibernation</li>
	<li>This product corrects an issue which Virtual Function RoCE driver causes Virtual Machine to be rebooted</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4025ccc149b544568897af8cffe102f9" version="c658eb28440f48aea407018193b2334c" lucid_version="MK000480GWSSC_MK000960GWSSD_MK001920GWSSE_ESXi@HPG3(B)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>PrefetchClear logic error on Write CMD.</li>
	<li>ICRC Data Integrity improvement.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="624db0a4b73e44c99c1f052c1aef041d" version="ed1d4fe37d2c4f4ca536ff844f6308d9" lucid_version="bnxt_roce.sles15sp0@216.0.88.3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="216.0.88.3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product now disables loading RoCE driver on VFs when Link Aggregation is enabled.</li>
	<li>This product now supports rdma-core v22.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product corrects an issue which RoCE bond is not getting created automatically after system reboot.</li>
	<li>This product corrects an issue which errors/performance may degrades after hot plug operation is performed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="214.0.190.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports&nbsp;the following network adapters.</p>

<ul>
	<li>HPE Ethernet 10Gb 2-port 537SFP+ Adapter</li>
	<li>HPE Ethernet 10Gb 2-port 537SFP+ FLR Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product adds a feature to group RoCE statistics<br />
This product fixes an issue to avoid VM reboot when RoCE driver was loaded on VF (of Thor).<br />
This product fixes RX buffer errors which reported in dmesg when running heavy jumbo traffic.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5087e00798b842dd96c4ffa314df5670" version="e71e8663a08241e98bddbc0bb2a47b2c" lucid_version="hpdsa.sles12.x86_64.rpm@1.2.10-176(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.2.10-176" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for SuSE Linux Enterprise Server 12 SP5</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Added PKCS signing process to fix the secure boot hang issue on Linux SLES12 SP5.</li>
	<li>Fix SATL error handling of AHCI reported Fatal errors with NCQ and Non-NCQ commands potentially causing RAID stack timeouts and excessive read/write command timeouts leading to SCSI bus reset with M.2 SSD drives configured with SW RAID.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.10-176" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Add support for SuSE Linux Enterprise Server 12 SP5</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7be61fcc837b4a3698dfdb3d9031d2e0" version="039b4e8fa00a459a85b5bd7d210c39ae" lucid_version="aep_ddrt_dimm@1.2.0.5435-rev1__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.2.0.5435" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.</p>

<p>This product contains mainly performance improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.0.5435" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release of Firmware for HPE Persistent Memory for Gen10 Servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="06046a88182e43b38ad262913cbf0784" version="2d5a58e0a38946b8882662e79b025c5e" lucid_version="esxi70-amshelpr-sw-bundle-sc@2021.04.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Agentless Management Service</strong></p>

<ul>
	<li>Implemented new vSphere 7.0U1 Daemon interface and is only supported on vSphere 7.0U1 and newer.&nbsp;&nbsp; New &quot;esxcli daemon control&quot; commands are now used to stop/start/restart AMS.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Agentless Management Service</strong></p>

<ul>
	<li>Fixed resource leak when AHS logging fails</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.12.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix false NVMe disk temperature alerts</li>
	<li>Fix missing OS, driver and software info from AHS logs</li>
	<li>Fix max and threshold temperature values for SATA disks to prevent fans from running at higher rate</li>
	<li>Fix false SATA disk status change alerts<br />
	&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3702e2a6624243b4a85fa9ca1f4c0ce2" version="8acda249fcb04e14816b494dc870a9e7" lucid_version="a48.win.x64@2.40_02-24-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-24-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support for AMD EPYC 7003 processors.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.<p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dffb1787348c4681b9170fbc360355c9" version="ff123b0c3de3404abe8ad6ad4209b0fb" lucid_version="MB4000JEQNL_MB6000JEQNN_ESXi@HPDB(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDB (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2eef2276e4ef4f45a356ace7c4982af7" version="718436bd5b3e4abc9ea382d86306b610" lucid_version="qla2xxx.rhel8.x86_64_legacy@10.02.01.00.a14-k1__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.01.00.a14-k1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 10.02.01.00.a14-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.01.00.64.08.0-k1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to&nbsp;Driver version&nbsp;10.01.00.64.08.0-k1</p>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="81798df39029402e8ad9bf5a76183ca6" version="db28952d84d0440985e77d385dccc151" lucid_version="brcmfcoe.sles15.x86_64@12.0.1342.0__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1342.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0 (c)" revision="c" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1259.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<table>
	<tbody>
		<tr>
			<td>
			<ul>
				<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
			</ul>
			&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></td>
		</tr>
	</tbody>
</table>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c4ef0470aa934a20948f1a88d8eff26d" version="a30b47fdbdc3487495db0c50e203f765" lucid_version="VO000960JWZJF_VO001920JWZJH_VO003840JWZJK_x64@HPD4__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modify Drive Vendor Identification String (VID) in Inquiry page from &ldquo;HP&rdquo; to &ldquo;HPE&rdquo;.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Increased Queue Size from 32 to 128 to be equal to the max number of chips.</li>
	<li>Refresh NM SRAM area periodically only when idle as a possible work around on NM SRAM parity error.</li>
	<li>Change the error response as 0x3 (SP_Busy) or 0x07 ( NO_SESSION_AVAILABLE) when host attempts to&nbsp;open another session while a session is already opened.</li>
	<li>Disable verify compare if APP_CHK=0</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="94af0b81860b4d31a8cc9f27961f4ea0" version="9046bf69793d4c4d800d1fe2e3e5e49a" lucid_version="MB1000JVYZL_MB2000JVYZN_MB3000JVYZP_x64@HPD3(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a0c7bf6781ed49d0a1fa08387a0fba69" version="b0dcc06402cc405fa2ceff7f256a9fe3" lucid_version="be2.w2k16@12.0.1195.0(C)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1195.0" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1195.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d7a820130b1346d2a8d4377d479232cf" version="f0c636a63ddf47d5bb58416fd9402259" lucid_version="MO000400JWUFT_MO000800JWUFU_MO001600JWUFV_ESXi@HPD3(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This release corrects logical block address mismatches that could results in partial or total data loss.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d6464fc039cd4a77b22febd8762dca03" version="818111f98b2a4317ab7b4bcaaeaab74d" lucid_version="coffeelake.win.x64@10.1.18015.8142-rev1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.1.18015.8142" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for the HPE ProLiant MicroServer Gen10 Plus Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.1.18015.8142" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to match the latest version available from Intel. There are no functional differences between 10.1.17861.8101 and 10.1.18015.8142.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="97296584dde64484806a51651325b7a3" version="2b868f15d342409eb0ee7edf47cecb6b" lucid_version="MK003840GWHTE_x64@HPG6(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="25be2dadb23b40e0941b154b3b7febfe" version="977a33d8eb4c4df4a8cfd6236507c0ba" lucid_version="Express_Bay.Lin@1.78(B)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.78" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SUSE Linux Enterprise Server 15 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.78" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrected the&nbsp;temperature status of Seagate NVMe hard drives.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1e10e20d274448bb9d2d1625880b482d" version="7606946689014fc39e6514fc86e53843" lucid_version="nicfwupg_qlnx2.win64@5.2.4.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.2.4.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue that platform would be randomly waked up by WOL packet.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.2.3.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects the display problem of the adapter name under RBSU.</li>
	<li>This products corrects some issues about the thermal reporting and temperature threadshold control of the adapter.</li>
	<li>This product addresses an issue where unexpected UMCE(Uncorrectable Machine Check Exception) appeared when powering on the system with NPAR(Network Partitioning) enabled.<br />
	&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="81163fed551c4f30a0af9ef8c5746c3e" version="df23189b2ab04d22a419c5d992c75d26" lucid_version="MT001600KWHAC_MT003200KWHAD_MT006400KWHAE_x64@HPS1(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPS1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPS1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a27996e3432942ccb8c76d5fed9fc9b4" version="0294ab77ad214079a7f2a7d17ea43ff1" lucid_version="VO000480JWDAR_VO000960JWDAT_VO001920JWDAU_x64@HPD8(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (B)" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="beee944cb2a04bc7ba023dbf3bec720d" version="3c55522e65bb404894d35ae14bf70587" lucid_version="qlbb.sles12.x86_64@8.55.5.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="8.55.5.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue where the driver fails to load in NPAR mode when RoCE Data Center Quantized Congestion Notification (DCQCN) is enabled.</li>
	<li>This product corrects an issue ethernet data rate limiting unable on VFs.</li>
	<li>This product addresses a system crash seen when injecting a fw_assert on a NIC PF.</li>
	<li>This product addresses a system crash seen when limiting number of MSI-X interrupt vectors as requested for VFs</li>
	<li>This product addresses a system crash seen when unloading and reloading the RoCE driver only.</li>
	<li>This product addresses a system crash seen during multiple reboots of virtual machines using VFs and RDMA.</li>
	<li>This product addresses a the connection recover failed with heavy traffic</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.50.25.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports SUSE Linux Enterprise Server 12 Service Pack 5</li>
	<li>This product now adds PCIe Advanced Error Recovery (AER) support</li>
	<li>This product now supports RoCE bonding mode</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue which system crash after unloading and reloading only roce driver</li>
	<li>This product corrects an issue which VF RDMA system crash in overnight reboot test on multiple VMs</li>
	<li>This product corrects an issue which VMs crash randomly upon advanced property disable/enable with Max VFs enumerated on all PFs</li>
	<li>This product corrects an issue which iSCSI BFS system fails to reboot if one port is down and reboot is attempted</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="791b93a05ce5422ca9f4427d20cc71b3" version="a3e15d3bd3614253a996732879c9cd2d" lucid_version="hpdsa.rhel8.x86_64.rpm@1.2.10-185__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.2.10-185" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added Support for Red Hat Enterprise Linux 8.3</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.10-181" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added Support for Red Hat Enterprise Linux 8.2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cdb3eb30e49445858807ae13ca01829a" version="c6da56793b454760ac679546e7c3d11a" lucid_version="emulex_windows_smartsan_enablement.x64@1.0.0.1(j)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.0.1" revision="j" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.1 (i)" revision="i" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 1.0.0.1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="49293a72024f46b59ade80ad47b20a00" version="9ef815b7c028464e95680e9f66e2e480" lucid_version="intel_vf.w2k16@1.12.9.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.12.9.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation library iavfmsg.dll.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.11.14.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5174bf3a7a274551a9858fbcf75b37fb" version="b26f87fc452c4998972983352fad588a" lucid_version="nmlx4_en.vmware67@2020.11.11__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.11.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New features in version 3.17.70.1:</strong></p>

<ul>
	<li>Adapter card&rsquo;s PSID is now displayed in the Privstats (Private statistics).</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.05.26" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New features in version 3.17.70.1:</strong></p>

<ul>
	<li>Adapter card&rsquo;s PSID is now displayed in the Privstats (Private statistics).</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>No Fixes are included in version 3.17.70.1:</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="787f189347ac420fbe52f5e6292d569d" version="ed2ae5ca86164ade8e2379e617abbc59" lucid_version="MB004000JWKGU_ESXi@HPD1(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aca57e96900e407ab0d44207053f1c1c" version="f1417dacfb8740b78afdd26388304b5d" lucid_version="MLNX_Open_Ethernet_CX6DX_NIC_MFT_FW_package.x64@1.0.3__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is updated to 22.29.1016:</strong></p>

<p>&nbsp;</p>

<p>P25960-B21 (HPE Ethernet 100Gb 2-Port QSFP56 MCX623106AS-CDAT Adapter)</p>

<p>P10180-B21 (Mellanox MCX623105AS-VDAT Ethernet 200Gb 1-port QSFP56 Adapter for HPE)<br />
&nbsp;</p>

<p><strong>New features and changes in version 22.29.1016:</strong></p>

<ul>
	<li>Improved NRZ link performance (RX algorithm).</li>
</ul>

<ul>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Optimized vDPA performance for PPS in scalability of up to 127 devices per port.</li>
	<li>When using a Multi-Host device, the firmware can now discover who is the external SmartNIC host (the Embedded CPU PF (ECPF) ) with the highest index that is responsible for performing offload activities to the adapter card.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
	<li>Changed the default value of DCQCN&#39;s NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Eye-Opening: supported only when using NRZ signal. (Beta)</li>
	<li>Option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order. To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command and set DPP relevant attributes.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>Error statistics and reporting for vDPA.</li>
	<li>IPv6 TSO offload.&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been resolved in firmware version 22.29.1016:</strong></p>

<ul>
	<li>Traffic for virtio hardware offload solution was prevented from &quot;iperf3&quot; in Windows Operating System.</li>
	<li>Traffic for virtio hardware offload solution was prevented from &quot;iperf3 -i 512&quot;.</li>
	<li>The struct virtio_net_hdr was not set properly by the virtio hardware offload solution. The following message appeared in dmesg during traffic: &quot;bad gso: type xx, size: xx&quot;.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs were configured, VM restart (VF/PF FLR) might had taken longer than that of when MKEY_BY_NAME was disabled.</li>
	<li>TCP/IP traffic received by the guest kernel with version higher than 4.10 were&nbsp;unstable because of corrupted GSO header. The following message could be seen from dmegs: &quot;bad gso: type: xx, size: xxxx&quot;.</li>
	<li>Enabling the RoCE Accelerator capability resulted in low performance<br />
	Note:&nbsp;The fix is available when all ports are set as Ethernet.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device&nbsp;is updated to 22.27.6008:</strong></p>

<p>P25960-B21 (HPE Ethernet 100Gb 2-Port QSFP56 MCX623106AS-CDAT Adapter)<br />
&nbsp;</p>

<p><strong>New features and changes in version 22.27.6008:</strong></p>

<ul>
	<li>The following are the minimal software/firmware versions that support PAM4 link speeds when connected using Mellanox NIC to Mellanox Switch and Mellanox NIC to 3rd Party Switches:
	<ul>
		<li>&nbsp;&nbsp; &nbsp;Mellanox Spectrum-3: 30.2007.1142</li>
		<li>&nbsp;&nbsp; &nbsp;Mellanox Spectrum-2: 29.2007.1142</li>
		<li>&nbsp;&nbsp; &nbsp;Switch SDK: 4.4.0920</li>
		<li>&nbsp;&nbsp; &nbsp;Mellanox Onyx: 3.9.0830-038</li>
		<li>&nbsp;&nbsp; &nbsp;SONiC/SAI: 201911</li>
		<li>&nbsp;&nbsp; &nbsp;ConnectX-6 Dx: 22.27.2008</li>
	</ul>
	</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; *Note: NICs with this firmware version support Mellanox-to-Mellanox connectivity with PAM4 link speeds.</p>

<ul>
	<li>Programmable Congestion Control (PCC) is at GA level.</li>
	<li>Enabled TLS offload v1.3 with key size 256.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been resolved in firmware version 22.27.6008:</strong></p>

<ul>
	<li>Encapsulated RoCE traffic to drop when IB padding was required.</li>
	<li>PortXmitWait HW counter to count when not expected due to an inaccuracy in the counter.</li>
	<li>On dual-port device after Rx buffer modification the Physical Function on the second port got restored although no expected. &nbsp;The Rx buffer changes when all Physical Functions resets over one port (through reboot /driver restart / FLR) while there were active Physical Functions over the second port.</li>
	<li>Previous Shared Buffer modifications being overrun after performing Shared Buffer modifications such as SBPR, SBPM, SBCM, the PFCC Flow Control).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f346518c20d40dba8036f1e105d5ddf" version="41d152c1a1f540aaa5fd9f4226274120" lucid_version="Apollo_2000.win@1.00(E)__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.00" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.00 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added HPE Digital Signature</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ea9fa4d5a6f7491799a049be7661a52e" version="77d443ac3c09432f95728c6c09a9b48d" lucid_version="hp-snmp-agents_rhel8_x86_64@10.9.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="10.9.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed issue where the HPE Synergy 3820C 10/20Gb Converged Network Adapter was showing not supported</li>
	<li>Corrected invalid utf8mb4 char in database</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.9.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>&nbsp;the hp-snmp-agents service version 10.9.0 on an HPE ProLiant Gen9 Server or an HPE Synergy Gen9 Compute Node may experience a segfault after installation or restart of the hp-snmp-agents service. cmahostd or cmapeerd process will be killed after the segfault.&nbsp; Pleaer review customer advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00098957en_us" style="color:#0563c1; text-decoration:underline">a00098957en_us</a>&nbsp;for additional details.</li>
	<li>The OS version reported by hp-snmp-agents reported a&nbsp;mismatch with the newer Linux OS distros. i.e., &quot;SUSE Linux Enterprise Server 12&quot; v.s &quot;SUSE Linux Enterprise Server 12 SP5&quot;&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8bd617958fd64494b0066602dc57ff65" version="bb8d7bc69f644c5ca40f6d13006f562a" lucid_version="DL20ML30Gen10SPS.Win.x64@05.01.04.208__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.208" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.113" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This image contains the latest Intel Server Platform Services (SPS) Firmware which contains mitigations for a variety of security vulnerabilities. The following vulnerabilities have been addressed in this SPS release: CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="230d4b31fe374aebb4d538e99b933aee" version="e9286289c12c40a68271ced06f704b00" lucid_version="MB012000GWDFE_x64@HPG2(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue during unaligned write commands, found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (D)" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue during unaligned write commands, found in supplier ongoing lab testing.Includes additional fixes to improve error handling and reliability.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aacf76bfa7674de086e8a84063eadb98" version="b5e8845268d142649c1270f9cec85f2c" lucid_version="DL20ML30GEN10SPS.fwpkg@05.01.04.208__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.208" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.113" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This image contains the latest Intel Server Platform Services (SPS) Firmware which contains mitigations for a variety of security vulnerabilities. The following vulnerabilities have been addressed in this SPS release: CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="227d96d8e01b420b8686e88babe12d3a" version="45cf739dde494438b0242c6056f54af4" lucid_version="Storcli-sut.esxi70@2021.04.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Supported on ESXi OS 7.0 64 bit</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="221cbeaf26c845fea3e521bf7ae66fa1" version="0e809a7618ca42ec915330863f0d8d77" lucid_version="VR000150GWEPP_VR000480GWEPR_x64@HPG1(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue which caused the drive to become non-functional.</li>
	<li>Fixes VPD Log D0h reported drive Sanitize times.</li>
	<li>Adds support for Security Log Page BBh.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue which caused the drive to become non-functional.</li>
	<li>Fixes VPD Log D0h reported drive Sanitize times. </li>
	<li>Adds support for Security Log Page BBh.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e05dec268daa4148be358b19a3214eed" version="39ea1c4e7b8c4e2a988e3c31195409e1" lucid_version="iavf.sles12.x86_64@4.0.2-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.0.2-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product now supports the following servers:</li>
</ul>

<p style="margin-left:80px; margin-right:0px; text-align:left">&nbsp;HPE Superdome Flex 280 &nbsp;<br />
&nbsp;HPE Superdome Flex Server &nbsp;<br />
&nbsp;HPE Superdome Flex 2&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.9.5-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a2580f8b900b4c35b050bbb3d0fe3010" version="32c1c94be67140aa8a3b3c07a1e2b751" lucid_version="MO001600KWVNB_MO003200KWVNC_MO006400KWVND_ESXi@HPK3__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Fixed SSD weargauge report error issue.</li>
	<li>Fixed Assign FWState as TR_DONE_ERR at the correct location.</li>
	<li>Prepare proper response data for Get Message Type Supported MCTP Command.</li>
	<li>Added code to preserve current feature values cross live firmware update.</li>
	<li>Allocate 4 bytes instead of 2 bytes for parameter code.</li>
	<li>Changed the value for NLB equal to NSize -1.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue where the SSID was not programmed correctly to the drive. This may cause issues with the drive not being identified correctly in the Integrated Lights Out Utility.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a25209e630db46018590185244995b68" version="aa3c121500f245a983dc412fbf1b0956" lucid_version="smartpqi.rhel7.x86_64.rpm@2.1.8-040__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.1.8-040" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>-</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.16-040" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Red Hat Linux Enterprise 7 Update 9</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="abb94178152540d4b4597562d0b2a39f" version="e72e09a823154db2bd8dc779aa2a7ff1" lucid_version="H240ar_H240_H244br_P244br_P440ar_P440_P441_x64@7.00__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="7.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add optimization for the iLO communication interface in order to have a more effective mechanism to check for ownership of the communication buffer</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Occasionally&nbsp; the drive will not accept any IO&rsquo;s after running Sanitize command for a period of time due to the FW being out of sync with the drive during that time</li>
	<li>Non-HPE drives could report &ldquo;Task Set Full&rdquo; due to the drives reaching the qdepth limit during heavy workload</li>
	<li>Raid volume is not discovered due to a bad drive consuming two slots during hotplug</li>
	<li>Data could become inaccessible when upgrading from&nbsp;firmware versions prior to 4.5x</li>
	<li>The controller could stop responding when executing a SCSI verify command due to a CPU exception</li>
	<li>The system could stop communicating due to an I/O command timeout</li>
	<li>While on HBA mode, a drive could stop responding due to an early allocated buffer release</li>
	<li>A SAS drive WWN is reported inaccuratelyy due to an incorrect report causing the driver to be out of sync with the device</li>
	<li>If using a 4G module, the controller could stop responding due to the SSD Cache metadata exceeding its limits during a Backup</li>
	<li>SSD Smart Cache module become disabled due to a reduction in usable cache space</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.88" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixes the following Issues</p>

<ul>
	<li>SATA drive could stop responding&nbsp; while on HBA mode when non-NCQ commands are executed</li>
	<li>Controller could stop responding when upgrading due to the DDR Cache Module exceeding its limitations</li>
	<li>SSD Cache module could become disable while upgrading FW</li>
	<li>Data from the HPE Smart Drive Backplane could potentially become corrupted if a non-HPE carrier is present</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bfbca72d042244cd96c184756848a501" version="36adf493840742f0bc1ecd74c89b77db" lucid_version="p92.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b929c06b33df46a182acd3e907e0dc53" version="c400015bffd441158c62d44eb4051232" lucid_version="emulex.fc.fw.win.x64_rt@2021.02.01__sc-windows-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This Firmware package contains following firmware versions:</p>

<p>&nbsp;</p>

<table border="1" cellpadding="1" cellspacing="1" dir="LTR" style="width:935px">
	<tbody>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 81E 8Gb Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 82E 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 84E 8Gb Quad Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1000E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1000E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E Quad Port 16Gb Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp; have separate components to update fibre channel and converged network adapters.&nbsp;This is a fibre channel&nbsp;update component.</p>

<p><strong>Contains:</strong></p>

<p>32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>16/32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>16 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>8 Gb HBA Standup firmware 2.10X6<br />
8 Gb standup universal boot image 12.60a4(12.6.302.0 BIOS, 12.6.284.0 UEFI)</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="26ad6199e9ca4196942c2e37e82e08a2" version="e1e7d54bccb84be59648ed6f023d2d16" lucid_version="VK003840GWSXL_x64@HPG2(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a745e380a94147888b60792dcbb594a8" version="9cc8f4cec0744039bffb010beb5e9f28" lucid_version="a42.fwpkg@2.40_02-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p><p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.</p><p>Added driver and option to enable SmartRAID SW RAID support for direct attached SATA and NVMe drives.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the fan runs at a higher than expected speed after upgrading the firmware of HPE Smart Array E208i or E408i to version 3.0.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.38_10-30-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices.  This option would only be used for PCIe Adapters that support his level of bifurcation. <p>Added support to increase the maximum amount of system memory to 8TB.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the server may encounter an Uncorrectable Machine Check Exception (UMCE) with a Bank of 0x00000005 or an Uncorrectable PCI Express Error with status 0x00040000 or 0x00010000. These errors will result in either an unexpected reset of the server or the server becoming unresponsive (such as Blue Screen with Windows, Purple Screen with VMware, or Kernel Panic with Linux).  This revision of the System ROM includes the latest revision of AMD firmware which addresses this issue.  This issue is not unique to HPE servers.<p>Addressed a rare issue where the system may fail to boot after a warm reset.<p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.<p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e94f7a42aa22458dbfe70c776b04164a" version="974e6b798a654efbbf9ed925a6f59a08" lucid_version="e1r.w2k12_r2@12.14.8.5__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.14.8.5" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.14.8.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="99c23ff7c8d6427fabec401028b615d8" version="72c2e075838b40f08ed07bf98b442459" lucid_version="MZPLJ1T6HBJR-000H3_MZPLJ3T2HBJR-000H3_MZPLJ6T_x64@EPK74H3Q-rev1__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="EPK74H3Q" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="EPK74H3Q" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d71ec216198e46cba0dfe25b58e109f0" version="96c31c60fa0341638f946b3f78235de6" lucid_version="hpemrsa.win.x64@7.16.16.0__sc-windows_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="7.16.16.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Supports Gen10+ MegaRAID Controllers.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.113.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b85e73b81c5b414ba6a301b86f35ed46" version="3be3dff59dac4a7da61b887c1d6c6438" lucid_version="MB6000GEXXV_ESXi@HPG2(J)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5829ee37bc994558baa6a98dd52b6154" version="bc70e165b2234d7689e6544517edc4db" lucid_version="EG000600JWJNP_EG001200JWJNQ_ESXi@HPD3(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4c73b927073e4ea9b7b9d214d86c215b" version="db137c88b05045ae9dc51920d767876b" lucid_version="Apollo_Gen10_45xx.ESXi@1.56(D)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.56" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added HPE Smart Array P824i-p controller&nbsp;support</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.56 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware vSphere 6.7 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d54c971d2c3047569ed2e37939cd2848" version="bb86ea5635d64545a1b84cce04e232ea" lucid_version="EO000400JWDKP_EO000800JWDKQ_EO001600JWDKR_ESXi@HPD2(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5c045315a07d45779f552f6cb831a2b4" version="39d674eb07b34ff394185e6972ccecc8" lucid_version="MLNX_Ethernet_Only_NIC_FW_package.x64@1.0.14__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.14" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5044 :</strong></p>

<p>&nbsp; &nbsp;779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)<br />
&nbsp; &nbsp;779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.29.1016:</strong></p>

<p>&nbsp; &nbsp;817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.29.1016:</strong><br />
&nbsp; &nbsp;817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</p>

<p><strong>Firmware for the following device is updated to 16.29.1016:</strong></p>

<p>&nbsp; &nbsp;874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</p>

<p><strong>New features and changes in version 16.28.1016:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New features and changes in version 14.29.1016:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction:
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes submitted in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.29.1016:</strong></p>

<ul>
	<li>The sent packet hung while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>The completions (CQ)completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.&nbsp;</li>
	<li>The fragmented IP packets were dropped.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.13" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5044 :</strong></p>

<p>&nbsp; &nbsp;779799-B21 (HP Ethernet 10G 2-port 546FLR-SFP+ Adapter)<br />
&nbsp; &nbsp;779793-B21 (HP Ethernet 10G 2-port 546SFP+ Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.27.4000:</strong></p>

<p>&nbsp; &nbsp;817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.27.4000:</strong><br />
&nbsp; &nbsp;817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</p>

<p><strong>Firmware for the following device is updated to 16.27.2008:</strong></p>

<p>&nbsp; &nbsp;874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</p>

<p><strong>New features and changes in version 16.27.2008:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New features and changes in version 14.27.4000:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction:
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes submitted in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.27.4000:</strong></p>

<ul>
	<li>The sent packet hung while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>The completions (CQ)completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.&nbsp;</li>
	<li>The fragmented IP packets were dropped.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="149f4a8ca4634ca1990be51d125b79e4" version="619a38a5800e45a59199272af6ae804a" lucid_version="VK0120GFDKE_VK0240GFDKF_VK0480GFDKH_VK0960GFDK_x64@HPG1(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d1f7ec922ab94039a6f0bbcfd0b7a0b4" version="3e7cdd2756c44f619daa342d0ce588ce" lucid_version="intel_cvl.w2k16@1.5.74.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.5.74.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fee6e5ef12074571bae786cf87c0e11d" version="3e9b98374ba84e52bb20a46f6ce04ddc" lucid_version="VK000240GWSRQ_VK000480GWSRR_VK000960GWSRT_ESXi@HPG4(B)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>PrefetchClear logic error on Write CMD.</li>
	<li>ICRC Data Integrity improvement.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4bd9dbd3dc9b4fbeb5492d2bb64a92e4" version="4428fac338834945998a2ea0e0714e38" lucid_version="Sheldon_Gen10_EXP_Lin@2.00(B)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="2.00" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SUSE Linux Enterprise Server 15 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00 (A)" revision="A" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to support Service Pack for ProLiant version 2018.09.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="91adee7c0766499184ce8d25a925669e" version="e6a71d41719846a9b87799e1cfcc34fd" lucid_version="IEGen10.fwpkg@0.2.2.0__fwpkg-generic_en,ja"/>
      <revision_history>
        <revision>
          <version value="0.2.2.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None  <P><B>Firmware Dependencies:</B></P>None  <P><B>Problems Fixed:</B></P>Addressed an extremely rare issue where Processor or Memory temperature reporting may not be collected properly by the platform and the system fans may be running faster than expected. This issue has been seen occasionally after a server reboot and is typically corrected with a subsequent server reboot. <P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0.2.1.2 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver.&nbsp;0.2.1.2&nbsp;(B)&nbsp; contains updates to the component packaging and is functionally equivalent to ver. 0.2.1.2.&nbsp; It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 0.2.1.2.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>Added support for HPE Persistent Memory featuring Intel Optane DC Persistent Memory.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="500c2e8334cb4bd793078241d6489395" version="f3b12cf262bc44309ae7f05932cc3cef" lucid_version="naples-rome.win.x64@3.1.0.0-rev1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="3.1.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated AMD IOMMU device</li>
	<li>Added support for HPE ProLiant Gen10 Plus Snap4 Latent servers</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.1.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated AMD IOMMU device</li>
	<li>Added support for HPE ProLiant Gen10 Plus Snap4 Latent servers</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ad60a281882240318ac9ec3091a5f1c9" version="47b3212ba02042aeb598f269f63fe789" lucid_version="qlogic_storport_x64.w2k19_rt@9.4.2.20__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="9.4.2.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version&nbsp;9.4.2.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.4.1.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version&nbsp;9.4.1.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b25d6b61a6364a739b769a23e6051253" version="60f89ebb45d044a299c4062fd1930599" lucid_version="be2net_bl.sles12@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 12 SP5.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1261.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>These drivers have been&nbsp;updated to maintain compatibility with the latest firmware.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="84d998355c4f4bc6997437e9a6c61fba" version="367b714ec28d4a94bd8dac6ae590697b" lucid_version="SPSGen10.Linux@04.01.04.423-rev1__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="04.01.04.423" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="04.01.04.423" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="58259b45dec7469580dfbddb76171768" version="c2e41e97e88146d4a8a621f0c2dbbfc5" lucid_version="ixgbevf.sles15@4.9.3-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9.3-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Suse Linux Enterprise Server 15 Service Pack 2</li>
	<li>This product enhances reliability via adding support for new mailbox communication between PF(Physical Function) and VF(Virtual Function) and remove its potential flaws that may lead to the undefined or faulty behavior</li>
	<li>This product enhances compatibility where new mailbox api implementation is alo compatible with old drivers</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product update Linux kernel documentation and Configure IRQ affinity tools</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="65aa8ad51df14f7ca86c6de593b3ad6a" version="05e467f5dc8642a8ae5bf9105544110b" lucid_version="brcmfcoe.driver.esxi65.zip_bl@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1278.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9c74011372f646da931c0840d918013f" version="862de50e8667442b9203e7abfa689a6b" lucid_version="MB6000JEQUV_MB8000JEQVA_x64@HPDB(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDB (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4bdcb7d3fc5c4d14af793003b89e365b" version="1830e4909b824f42a783abe6d2617e6a" lucid_version="U45.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Added a new BIOS/Platform Configuration (RBSU) option to Advanced PCIe Device Configuration called PCIe Switch MMIO Configuration.  This option addresses a virtualization issue caused by different interpretations of the PCIe specification by disabling PCIE Switch MMIO Configuration.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cf36f8009ed4464f93a208bf9c35b47b" version="511aa501d764457b94bb77a0ee75455d" lucid_version="lpfc.sles15.x86_64_legacy@12.8.352.11__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.275.14" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.6.275.14</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b78250c893a84500a966768e0af25a67" version="69d0331d632347d888b4d8a605efda59" lucid_version="megaraid_sas.sles12.x86_64.rpm@07.706.05.00-14-rev1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="07.706.05.00-14" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added ProLiant features support (Megacell status, AHS, Spade, Sanitize and Expander)</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="07.706.05.00-14" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>RC4 drop for snap4</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="79ba405b8c19425aa9a14902b672b652" version="19fb43bb7c8642339768058f8e1b17de" lucid_version="nicfwupg_intel.vmware@3.14.5__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="3.14.5" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where Systems Insight Display (SID) modul is green when there&#39;s no Network connection.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.13.31" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an WOL issue that system wakes up automatically if any magic packet being sent before system was shut down.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="426a1761f14e4ba492f138726a8bcbf6" version="dc7e4db6722046549c01bf73d87fe552" lucid_version="XP0120GFJSL_XP0240GFJSN_x64@HPS4(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPS4" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPS4 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="424586858da54235abb9a96e632bc309" version="68e5bc824da645eca809f9b2c2fbe5d1" lucid_version="esxi67-mgmt-sw-bundle-sc@2021.04.12__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.12" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Agentless Management Service</strong></p>

<ul>
	<li>Reduce Software Inventory cache refresh time&nbsp;to 15 seconds to help resolve OneView online SW update issues without reboot.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.12.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Agentless Management Service</strong></p>

<ul>
	<li>Fix PSOD exception resulting from repeated failed attempts to communicate to iLO (Gen10 AMS only)</li>
	<li>Fix false NVMe disk temperature alerts</li>
	<li>Fix missing OS, driver and software info from AHS logs</li>
	<li>Fix max and threshold temperature values for SATA disks to prevent fans from running at higher rate</li>
	<li>Fix false SATA disk status change alerts<br />
	&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cda15b2dd1914971b9e0993731ba714c" version="6ca31391ed404b429968380c397a5207" lucid_version="Gen10Plus_UBM4_Backplane_PIC.Esxi@1.20__sc-linux-fw-array_en"/>
      <revision_history>
        <revision>
          <version value="1.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial release</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c02f997871554705a1c6e597965673df" version="97628ae8f18543cdac2556582a15e687" lucid_version="U37.Linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3a09afbc8f48497998b1cf5fc8b9ef29" version="8bec669252cf4c45a4159b91ff3a7948" lucid_version="mlnx_en_roce_mlx5.rhel8u3.x86_64.rpm@5.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.2:</strong></p>

<p><strong>For ConnectX-5 Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>CQE compression support for Rx multi-strides packets.</li>
		<li>Configuring QoS on a single QP or on a group of QPs.</li>
		<li>Encap/decap hardware offload of IPv4 traffic over MPLS-over-UDP. This can be used in networks with MPLS routers to achieve more efficient routing.</li>
		<li>Connection tracking rules on VFs to forward traffic from one VF to the other.</li>
		<li>Offloading sFlow sampling rules.</li>
	</ul>
	</li>
</ul>

<p><strong>For ConnectX-5 Adapters and ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>A locking mechanism to enable parallel insertion of rules into the software steering using the mlx5dv_dr API. The parallel insertion improves the insertion rate and takes place when adding Rx and Tx rules via the FDB domain.</li>
		<li>Option to match mlx5dv_dr API on Geneve tunnel using a dynamic flex parser. The option header consists of class, type, length and data. The parser should be configured using devx command, after which a rule can be created to match on parser ID and data.</li>
		<li>Geneve tunneling offload, including matching on extension header.</li>
		<li>Parallel insertion and deletion of offloaded rules using multiple&nbsp;OVS threads.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>[Beta] Modify GTP-U TEID. This support requires flex parser&nbsp;configuration.</li>
		<li>[Beta] Improved performance of OVS Connection Tracking flows by&nbsp;enabling the merge of the multi-table flow matches and actions into one joint flow.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters and above:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Transmitted packet timestamping accuracy can be improved when using a timestamp generated at the port level instead of a timestamp generated upon CQE creation. Tx port time-stamping better reflects the actual time of a packet&#39;s transmission. This feature is disabled by default. The feature can be enabled or disabled using the following command. ethtool --set-priv-flags tx_port_ts on / off.</li>
	<li>Offloading tunnel rules when the source interface is VF (in addition to uplink) in the Hypervisor.</li>
	<li>Using Mirroring Offload with Connection Tracking.</li>
	<li>ASO flow meter using the mlx5dv_dr API, which allows for monitoring the packet rate for specific flows. When a packet hits a flow that is connected to a flow meter, the rate of packets through this meter is evaluated, and the packet is marked with a color copied into one of the C registers, according to the current rate compared to the reference rate.</li>
	<li>ASO first hit using the mlx5dv_dr API, which allows for tracking rule hits by packets. When a packet hits a rule with the ASO first hit action, a flag is set indicating this event, and the original value of the flag is copied to one of the C registers.</li>
	<li>mlx5dv_dr API support for matching on a new field &quot;gtpu_first_ext_dw_0&quot;. This field enables packet filtering based on the GTP-U first extension header (first dword only). To enable parsing of tunnel GTP-U extension header, run the following command. ./cloud_fw_reset.py FLEX_PARSER_PROFILE_ENABLE=3.</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Lx Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>IPsec full offload support for extended sequence number, replay protection window and lifetime packet limit.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;All HCA&#39;s:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>New query GID API that allows for querying a single GID entry by its port and GID index, or querying for all GID tables of a specific device. This API works over ioctl instead of sysfs, which accelerates the querying process.</li>
		<li>Performing multi-host firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reload.</li>
		<li>[Alpha] Firmware live patching in the driver. Live patching updates the firmware without the need to perform firmware reset. However, it can only be applied in scenarios where the difference between the current and new firmware versions are minor, which is decided upon by the firmware itself.</li>
		<li>devlink tool for performing firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reloads the current firmware image from the flash in case no new firmware was pending. For further information, please refer to the the devlink man page.</li>
		<li>A resiliency mechanism for the driver to manually poll the command event queue (EQ) in case of a command timeout. In case the resiliency mechanism finds unhandled event queue entry (EQE) due to a lost interrupt, the driver will handle it, after which the command interface returns to a healthy state.</li>
		<li>Setting a sniffer private flag is deprecated and no longer required. In order to capture offloaded/RoCE traffic, tcpdump can now be run on the RDMA device.</li>
		<li>Added per-port reporters to devlink health to manage per-port health activities. Users can now access the devlink port reporters by specifying the port index in addition to the device devlink name through the devlink health commands API. This update was first introduced in iproute2 v5.8. As part of this feature, mlx5e Tx and Rx reporters are now redefined as devlink port reporters. For examples, please see devlink-health manpage</li>
		<li>Optimized memory consumption of memory registration in huge page systems. As an example, in a 2MB huge page system, 600 MB would be saved for 100 GB memory registration.</li>
		<li>mlx5dv API to modify the configured UDP source port for RoCE packets of a given RC/UC QP when QP is in RTS state.</li>
		<li>Accelerating Tx datapath by saving PCI bandwidth and CPU utilization. The savings are achieved by aggregating multiple packets into a single WQE. The feature is driven by xmit_more for certain traffic types, such as UDP.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.2:</strong></p>

<ul>
	<li>Clearing min_rate on all SR-IOV legacy VFs after setting min_rate to at least one of the VFs did not disable QoS min_rate.</li>
	<li>An empty /usr/src/mlnx-ofa_kernel/default is now no longer created.</li>
	<li>An issue where installing packages through a repository failed after generation of metapackages using --add-kernel-support. The failure occurred due to excessive and incorrect Obsolete headers in those metapackages.Enabled installation of mlnx-ofa_kernel package to /bin/python3 instead of / usr/bin/python3 on RHEL 8.x systems.</li>
	<li>All IPoIB offload packets were wrongly counted as rx_csum_complete. These packets are now identified as rx_csum_unnecessary packets.</li>
	<li>mlx5dv_dr_rule_destroy segmentation fault could happen in rare cases with multiple rules on the same matcher with a different number of actions. This could happen after reusing an already deleted rule memory with less actions.</li>
	<li>An issue of moving to SwitchDev mode after configuring DSCP (Differentiated Service Code Point).</li>
	<li>Global traffic class configuration did not take effect on DC QPs (Dynamically Connected Queue Pairs).</li>
	<li>ib_send_bw traffic frequently dropped to zero when RDMA CM was used, because of incorrect&nbsp;min_rnr_timer setting on the responder side. The min_rnr_timer setting is now aligned with the setting in non-RDMA CM cases.</li>
	<li>Traffic did not pass over VFs with VST QinQ feature is enabled.</li>
	<li>When traffic was sent over Geneve VLAN with Tx VLAN offload enabled and TSO (TCP Segmentation Offload)&nbsp;or Tx csum enabled, traffic could be dropped and not sent to the wire.</li>
	<li>An issue that caused the firmware to restart upon installing mlnxofed-dpdk-upstream-libs package manually.</li>
	<li>Bad utility paths in rdma-core &quot;dracut&quot; hooks on SLES systems, which used to result in the following errors when running &quot;dracut&quot; with the &quot;--add rdma&quot; option. dracut-install:
	<ul>
		<li>ERROR: installing &lsquo;/usr/libexec/mlx4-setup.sh&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/mlx4-setup.sh dracut-install: ERROR: installing &lsquo;/usr/libexec/rdma-set-sriov-vf&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/rdma-set-sriov-vf</li>
	</ul>
	</li>
	<li>Traffic class value was not updated in DCT when set via sysfs.</li>
	<li>A doorbell loss issue on AMD platforms with Secure Memory Encryption (SME).</li>
	<li>Registering memory using mlx5dv_devx_umem_reg while forking. Without this fix, applications which use fork() or similar syscalls while using a memory registered with umem_reg could hang due to incorrect physical page mapping. This fix requires setting the IBV_FORK_SAFE environment variable.</li>
	<li>When&nbsp;unbinding the device resulted in the following message being printed to the dmesg: &quot;failed to disable DC tracer&quot;</li>
	<li>Content of file /sys/class/net//statistics/ multicast might have been out of date and might have displayed values lower than the real values.</li>
	<li>ERSPAN (Encapsulated Remote SPAN) protocol was available only when turning off Tx checksum offload.</li>
	<li>A udev script issue which caused non-mellanox devices to be renamed.</li>
	<li>Missing representor statistics when using ifconfig.</li>
	<li>Fixed wrong value of skb mark of received packets on representors.</li>
	<li>An issue which caused second port representors to be named as first port representors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dea3d95c6cc64119ac507d9a05278db0" version="6672f424804b44f39e3300014b3bf000" lucid_version="LO0400KEFJQ_LO0800KEFJR_LO1600KEFJT_LO2000KEF_ESXi@HPK4(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="672edcd2af9a4bd18876e5e3192cd831" version="fb8978ae477e402180f62b0246999986" lucid_version="U40.linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ae3d527d10354a82bc7ece2ff1ca3e96" version="80574330e1cc4b56b52d8e244c0bec1c" lucid_version="P89.VMware@2.80_10-16-2020(B)__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.80_10-16-2020(B) contains updates to the component packaging and is functionally equivalent to ver. 2.80_10-16-2020. It is not necessary to upgrade with Revision (B) if a previous component revision was used to upgrade the firmware to 2.80_10-16-2020.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.80_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5ace706167bb418f8ac30077c43e3171" version="b27a1e18ac83489096e937e70336ea25" lucid_version="P408i-p_P408e-p_P408i-a_P408i-c_E208i-p_x64@3.53-rev1__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="3.53" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added UBM type3 backplane support</li>
	<li>Added support for long device model/product ID for SATA drives.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li style="list-style-type: disc;">An issue where the controller might become unresponsive while receiving periodic I/Os.</li>
	<li style="list-style-type: disc;">Host I/O timeouts might occur due to continuing firmware attempts to discover devices during an expander configuration.</li>
	<li style="list-style-type: disc;">A controller lockup problem (with code 0x1E10) might occur when a bad drive with unsupported block size.</li>
	<li style="list-style-type: disc;">A Controller hangs when multiple hot-plug and hot remove events (drives or JBODs) were being processed.</li>
	<li style="list-style-type: disc;">A Controller hangs on Flash Backed Write Cache enabled logical drives with sequential read towards the end of the logical drive.</li>
	<li style="list-style-type: disc;">A Controller hangs when hot-plug physical drive with outstanding I/Os.</li>
	<li style="list-style-type: disc;">A controller hangs if a host I/O and background consistency check simultaneously encounter a RAID-1 ADM or RAID-10 ADM stripe in which all drives have URE&#39;s on the same LBA.</li>
	<li style="list-style-type: disc;">A Controller hangs when a drive is failed from a RAID6/60 logical drive when the host issues a Clear Controller Configuration command or any other configuration change command.</li>
	<li style="list-style-type: disc;">The SSD data drive might be set offline (with reason code 0x37) when hot-remove and re-insert during a spare rebuild in progress.</li>
	<li style="list-style-type: disc;">A drive might not be exposed to the OS if the system is rebooted just after the sanitize erase finishes.</li>
	<li style="list-style-type: disc;">UBM backplanes are not detected properly when connected to specific ports (port 7 or above) in the 12Gb SAS Expander Card.</li>
	<li style="list-style-type: disc;">A controller might hang when idle followed by a short burst of I/Os.</li>
	<li style="list-style-type: disc;">The controller might return the previous drive firmware version, after a drive firmware update on SATA drives.</li>
	<li style="list-style-type: disc;">The controller might fail drives (with reason code 0x49, I/O freeze timeout) during expander firmware upgrade on a multi-expander enclosure configuration.</li>
	<li style="list-style-type: disc;">Hot-added drive LED control fails on specific fan-out expander type external enclosure models.</li>
	<li style="list-style-type: disc;">Smart Array Essential series controller might not be responsive when processing sequential I/Os and the firmware coalescing logic can&#39;t get the memory.</li>
	<li style="list-style-type: disc;">Filesystem or application might read old data when SmartCache configurations encounter intermittent write I/O errors to a primary logical drive.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.53" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added UBM type3 backplane support</li>
	<li>Added support for long device model/product ID for SATA drives.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li style="list-style-type: disc;">An issue where the controller might become unresponsive while waiting for a non-existent pre-fetch queue entry.</li>
	<li style="list-style-type: disc;">Host I/O timeouts might occur due to continuing firmware attempts to discover devices during an expander configuration.</li>
	<li style="list-style-type: disc;">A controller lockup problem (with code 0x1E10) might occur when a bad drive with an unsupported block size is connected into slot 0.</li>
	<li style="list-style-type: disc;">A Controller hangs issue when multiple hot-plug and hot remove events (drives or JBODs) were being processed.</li>
	<li style="list-style-type: disc;">A Controller hangs issue on DDR caching enabled logical volumes with sequential read towards the end of the volume.</li>
	<li style="list-style-type: disc;">A Controller hangs issue with outstanding I/Os on a degraded logical volume when the physical drive fails.</li>
	<li style="list-style-type: disc;">A Controller hangs issue if a host I/O and background consistency check simultaneously encounter a RAID-1 ADM stripe in which all drives have URE&#39;s on the same LBA.</li>
	<li style="list-style-type: disc;">A Controller hangs issue when a drive is failed from a RAID6/60 logical drive when the host issues a Clear Controller Configuration command or any other configuration change command.</li>
	<li style="list-style-type: disc;">The SSD data drive might be set offline (with reason code 0x37) when hot-remove and re-insert during a spare rebuild in progress.</li>
	<li style="list-style-type: disc;">A drive might not be exposed to the OS after reboot if the system is rebooted just after the sanitize erase finishes.</li>
	<li style="list-style-type: disc;">UBM backplanes are not detected properly when connected to specific ports (port 7 or above) in an expander card configuration.</li>
	<li style="list-style-type: disc;">A Controller hangs issue when processing idle time followed by a short burst of I/Os.</li>
	<li style="list-style-type: disc;">The controller might return the previous drive firmware version, after a drive firmware update on SATA drives.</li>
	<li style="list-style-type: disc;">The controller might fail drives (with reason code 0x49, I/O freeze timeout) during expander firmware upgrade on a multi-expander enclosure configuration.</li>
	<li style="list-style-type: disc;">Hot-added drive LED control fails on specific fan-out expander type external enclosure models.</li>
	<li style="list-style-type: disc;">sequential I/Os and the firmware coalescing logic can&#39;t get the memory.</li>
	<li style="list-style-type: disc;">Filesystem or application might read old data when SmartCache configurations encounter intermittent write I/O errors to a primary logical drive.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d36b5614c00b4d00b66a58209cc5bffb" version="b94a83cc8d4b4d3e826345e2d431aa74" lucid_version="u41.linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ab0976902eae4e0c8757219b825c91f8" version="0c0c89797243477fab615e13eccf9898" lucid_version="u30.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5413adceb7d241de900274e399d9c777" version="9b25db2e6857406f872ffca0eacc4876" lucid_version="intel_pvl.w2k19@12.18.11.1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.18.11.1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.18.9.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="866094c6d7794cccb749f7742eb5d7bc" version="ea6daa23316b4319bcecdd250204e4dc" lucid_version="iLO4_FW.ESXi@2.77(a)__sc-linux-fw-ilo_en"/>
      <revision_history>
        <revision>
          <version value="2.77" revision="a" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fail to deploy iLO Firmware from SPP on Gen9 servers running ESXi&nbsp;7.x with an error &quot;Update Returned an Error&quot;.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.77" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support to display login banner SSH login</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Potential vulnerabilities in network stack. Click <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbhf04070en_us">here</a> to know more about the Security Vulnerabilities.</li>
	<li>Active directory test may fail during LDAP authentication.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1f96d5ce1b7c4e7fae4a08d7d5e4898d" version="51dd40934f09487a97f623102c08ad76" lucid_version="mlnx_en_roce_mlx5.sles12sp4.x86_64.rpm@5.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.2:</strong></p>

<p><strong>For ConnectX-5 Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>CQE compression support for Rx multi-strides packets.</li>
		<li>Configuring QoS on a single QP or on a group of QPs.</li>
		<li>Encap/decap hardware offload of IPv4 traffic over MPLS-over-UDP. This can be used in networks with MPLS routers to achieve more efficient routing.</li>
		<li>Connection tracking rules on VFs to forward traffic from one VF to the other.</li>
		<li>Offloading sFlow sampling rules.</li>
	</ul>
	</li>
</ul>

<p><strong>For ConnectX-5 Adapters and ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>A locking mechanism to enable parallel insertion of rules into the software steering using the mlx5dv_dr API. The parallel insertion improves the insertion rate and takes place when adding Rx and Tx rules via the FDB domain.</li>
		<li>Option to match mlx5dv_dr API on Geneve tunnel using a dynamic flex parser. The option header consists of class, type, length and data. The parser should be configured using devx command, after which a rule can be created to match on parser ID and data.</li>
		<li>Geneve tunneling offload, including matching on extension header.</li>
		<li>Parallel insertion and deletion of offloaded rules using multiple&nbsp;OVS threads.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>[Beta] Modify GTP-U TEID. This support requires flex parser&nbsp;configuration.</li>
		<li>[Beta] Improved performance of OVS Connection Tracking flows by&nbsp;enabling the merge of the multi-table flow matches and actions into one joint flow.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters and above:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Transmitted packet timestamping accuracy can be improved when using a timestamp generated at the port level instead of a timestamp generated upon CQE creation. Tx port time-stamping better reflects the actual time of a packet&#39;s transmission. This feature is disabled by default. The feature can be enabled or disabled using the following command. ethtool --set-priv-flags tx_port_ts on / off.</li>
	<li>Offloading tunnel rules when the source interface is VF (in addition to uplink) in the Hypervisor.</li>
	<li>Using Mirroring Offload with Connection Tracking.</li>
	<li>ASO flow meter using the mlx5dv_dr API, which allows for monitoring the packet rate for specific flows. When a packet hits a flow that is connected to a flow meter, the rate of packets through this meter is evaluated, and the packet is marked with a color copied into one of the C registers, according to the current rate compared to the reference rate.</li>
	<li>ASO first hit using the mlx5dv_dr API, which allows for tracking rule hits by packets. When a packet hits a rule with the ASO first hit action, a flag is set indicating this event, and the original value of the flag is copied to one of the C registers.</li>
	<li>mlx5dv_dr API support for matching on a new field &quot;gtpu_first_ext_dw_0&quot;. This field enables packet filtering based on the GTP-U first extension header (first dword only). To enable parsing of tunnel GTP-U extension header, run the following command. ./cloud_fw_reset.py FLEX_PARSER_PROFILE_ENABLE=3.</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Lx Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>IPsec full offload support for extended sequence number, replay protection window and lifetime packet limit.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;All HCA&#39;s:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>New query GID API that allows for querying a single GID entry by its port and GID index, or querying for all GID tables of a specific device. This API works over ioctl instead of sysfs, which accelerates the querying process.</li>
		<li>Performing multi-host firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reload.</li>
		<li>[Alpha] Firmware live patching in the driver. Live patching updates the firmware without the need to perform firmware reset. However, it can only be applied in scenarios where the difference between the current and new firmware versions are minor, which is decided upon by the firmware itself.</li>
		<li>devlink tool for performing firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reloads the current firmware image from the flash in case no new firmware was pending. For further information, please refer to the the devlink man page.</li>
		<li>A resiliency mechanism for the driver to manually poll the command event queue (EQ) in case of a command timeout. In case the resiliency mechanism finds unhandled event queue entry (EQE) due to a lost interrupt, the driver will handle it, after which the command interface returns to a healthy state.</li>
		<li>Setting a sniffer private flag is deprecated and no longer required. In order to capture offloaded/RoCE traffic, tcpdump can now be run on the RDMA device.</li>
		<li>Added per-port reporters to devlink health to manage per-port health activities. Users can now access the devlink port reporters by specifying the port index in addition to the device devlink name through the devlink health commands API. This update was first introduced in iproute2 v5.8. As part of this feature, mlx5e Tx and Rx reporters are now redefined as devlink port reporters. For examples, please see devlink-health manpage</li>
		<li>Optimized memory consumption of memory registration in huge page systems. As an example, in a 2MB huge page system, 600 MB would be saved for 100 GB memory registration.</li>
		<li>mlx5dv API to modify the configured UDP source port for RoCE packets of a given RC/UC QP when QP is in RTS state.</li>
		<li>Accelerating Tx datapath by saving PCI bandwidth and CPU utilization. The savings are achieved by aggregating multiple packets into a single WQE. The feature is driven by xmit_more for certain traffic types, such as UDP.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.2:</strong></p>

<ul>
	<li>Clearing min_rate on all SR-IOV legacy VFs after setting min_rate to at least one of the VFs did not disable QoS min_rate.</li>
	<li>An empty /usr/src/mlnx-ofa_kernel/default is now no longer created.</li>
	<li>An issue where installing packages through a repository failed after generation of metapackages using --add-kernel-support. The failure occurred due to excessive and incorrect Obsolete headers in those metapackages.Enabled installation of mlnx-ofa_kernel package to /bin/python3 instead of / usr/bin/python3 on RHEL 8.x systems.</li>
	<li>All IPoIB offload packets were wrongly counted as rx_csum_complete. These packets are now identified as rx_csum_unnecessary packets.</li>
	<li>mlx5dv_dr_rule_destroy segmentation fault could happen in rare cases with multiple rules on the same matcher with a different number of actions. This could happen after reusing an already deleted rule memory with less actions.</li>
	<li>An issue of moving to SwitchDev mode after configuring DSCP (Differentiated Service Code Point).</li>
	<li>Global traffic class configuration did not take effect on DC QPs (Dynamically Connected Queue Pairs).</li>
	<li>ib_send_bw traffic frequently dropped to zero when RDMA CM was used, because of incorrect&nbsp;min_rnr_timer setting on the responder side. The min_rnr_timer setting is now aligned with the setting in non-RDMA CM cases.</li>
	<li>Traffic did not pass over VFs with VST QinQ feature is enabled.</li>
	<li>When traffic was sent over Geneve VLAN with Tx VLAN offload enabled and TSO (TCP Segmentation Offload)&nbsp;or Tx csum enabled, traffic could be dropped and not sent to the wire.</li>
	<li>An issue that caused the firmware to restart upon installing mlnxofed-dpdk-upstream-libs package manually.</li>
	<li>Bad utility paths in rdma-core &quot;dracut&quot; hooks on SLES systems, which used to result in the following errors when running &quot;dracut&quot; with the &quot;--add rdma&quot; option. dracut-install:
	<ul>
		<li>ERROR: installing &lsquo;/usr/libexec/mlx4-setup.sh&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/mlx4-setup.sh dracut-install: ERROR: installing &lsquo;/usr/libexec/rdma-set-sriov-vf&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/rdma-set-sriov-vf</li>
	</ul>
	</li>
	<li>Traffic class value was not updated in DCT when set via sysfs.</li>
	<li>A doorbell loss issue on AMD platforms with Secure Memory Encryption (SME).</li>
	<li>Registering memory using mlx5dv_devx_umem_reg while forking. Without this fix, applications which use fork() or similar syscalls while using a memory registered with umem_reg could hang due to incorrect physical page mapping. This fix requires setting the IBV_FORK_SAFE environment variable.</li>
	<li>When&nbsp;unbinding the device resulted in the following message being printed to the dmesg: &quot;failed to disable DC tracer&quot;</li>
	<li>Content of file /sys/class/net//statistics/ multicast might have been out of date and might have displayed values lower than the real values.</li>
	<li>ERSPAN (Encapsulated Remote SPAN) protocol was available only when turning off Tx checksum offload.</li>
	<li>A udev script issue which caused non-mellanox devices to be renamed.</li>
	<li>Missing representor statistics when using ifconfig.</li>
	<li>Fixed wrong value of skb mark of received packets on representors.</li>
	<li>An issue which caused second port representors to be named as first port representors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.1:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>The user can now set a packet pacing rate on the special queues that forward traffic from one physical port to the other.</li>
		<li>Connection Tracking (TC) offload on network interfaces that are in NIC mode, as opposed to SwitchDev mode. Note: This support is currently available for interfaces with physical functions only.</li>
		<li>Limiting SMP MADs on the wire using a Send window mechanism. This allows the user to keep track of the outstanding number of SMP MADs per-port, and allows for limiting this number to shape traffic when the pace of SMP MADs requires control.</li>
		<li>Direct Rule (DR) API support for sampling action to allow duplication and sampling of some ratio of the traffic. The API also allows to perform a set of different DR actions on the sampled traffic.</li>
	</ul>
	</li>
	<li>Enabled on-demand device memory sync to free cached memory.&nbsp;</li>
	<li>Simplified the sanity test that verified which systems must use python3 and not python2, so that when rebuilding the kernel packages using --add-kernel-support, the systems based on RHEL/CentOS 8 were detected.&nbsp;</li>
	<li>Added back rx_dct_connect counter that queries the number of received connection requests for the associated DCTs</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.1:</strong></p>

<ul>
	<li>Extended mlx5 recovery-flow delay on VF driver when PCI interface went down</li>
	<li>ibv_get_device_list returned only accessible devices.</li>
	<li>&ldquo;rpmbuild&rdquo; (that includes basic support for building RPM packages) was not installed by the install script on SLES15 SPx systems when trying to rebuild packages.</li>
	<li>AF_XDP was not functional.</li>
	<li>neohost-backend and neohost-sdk packages were not properly removed by the uninstallation procedure and might have required manual removal before re-installing or upgrading MLNX_OFED driver.</li>
	<li>During MLNX_OFED installation, warning messages related to modules iw_cxgb3 and iw_nes might have appeared in the log.</li>
	<li>Command timeouts occurred when the Hypervisor disabled the VF&#39;s PCI interface. This fix reduces the device removal time to 2 seconds.</li>
	<li>MLNX_OFED/MLNX_EN installer will no longer automatically remove the spdk package when installing the driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a2a4da3071f14ea0b229b51686cf6bd9" version="0ed32969accd4e30809f5ca59302841a" lucid_version="vsm.fwsc.lin@4.3.6.0(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="4.3.6.0" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SUSE Linux Enterprise Server 15 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.3.6.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial drop for Snap3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a9179e239bb643d4b08c6272f4499a35" version="d575131e632a4d9c8ae1bc9646cebfbe" lucid_version="bnxt_roce.sles12sp5.x86_64@218.0.7.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="218.0.7.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product now supports rdma-core v29(rdma user space application)</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="216.0.88.3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product corrects an issue which RoCE bond is not getting created automatically after system reboot</li>
	<li>This product corrects an issue which errors/performance may degrades after hot plug operation is performed</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ae3d91fc556c4e44b780b594f473e350" version="1a1a8d6697e04bd09b91ba9e90cd9022" lucid_version="bnxt_roce.sles15sp2@218.0.7.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="218.0.7.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f63395ea958425f83bb31303381afd1" version="c4e04a1114654229848238d8de9d91ee" lucid_version="netxtreme2_bl.sles12@7.14.76-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="7.14.76-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 12 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue where the driver fails to load in NPAR mode when RoCE Data Center Quantized Congestion Notification (DCQCN) is enabled.<br />
This product addresses a system crash seen when unloading and reloading the RoCE driver only.<br />
This product addresses a system crash seen during multiple reboots of virtual machines using VFs and RDMA.<br />
This product addresses a system crash seen when injecting a fw_assert on a NIC PF.<br />
This product corrects an issue where a system fails to shutdown after reboots in iSCSI BFS.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.14.63.1-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers correct an issue where iSCSI target discovery fails to complete when booting from SAN or a local HD.</p>

<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="39b3bcd8f8b243ad9879002d6ba846cc" version="4c83e68432c04363b6dace30a1575749" lucid_version="qlbb.sles15@8.55.5.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="8.55.5.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><br />
This product now supports Suse Linux Enterprise Server 15 Service Pack 2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue where the driver fails to load in NPAR mode when RoCE Data Center Quantized Congestion Notification (DCQCN) is enabled.</li>
	<li>This product corrects an issue ethernet data rate limiting unable on VFs.</li>
	<li>This product addresses a system crash seen when injecting a fw_assert on a NIC PF.</li>
	<li>This product addresses a system crash seen when limiting number of MSI-X interrupt vectors as requested for VFs</li>
	<li>This product addresses a system crash seen when unloading and reloading the RoCE driver only.</li>
	<li>This product addresses a system crash seen during multiple reboots of virtual machines using VFs and RDMA.</li>
	<li>This product addresses a the connection recover failed with heavy traffic</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.50.25.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports SUSE Linux Enterprise Server 15 SP2.</li>
	<li>This product now adds PCIe Advanced Error Recovery (AER) support.</li>
	<li>This product now supports RoCE bonding mode.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue which system crash after unloading and reloading only roce driver</li>
	<li>This product corrects an issue which VF RDMA system crash in overnight reboot test on multiple VMs</li>
	<li>This product corrects an issue which VMs crash randomly upon advanced property disable/enable with Max VFs enumerated on all PFs</li>
	<li>This product corrects an issue which iSCSI BFS system fails to reboot if one port is down and reboot is attempted</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="72599cd140dd4be0b9dbc3875c332654" version="4cb761579d3a48d7ac8e4ca388614a80" lucid_version="MB4000GEFNA_MB6000GEFNB_x64@HPG6(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="085dc91909144ecd8918a217072a43fb" version="10d4765adfcb47ceab4cd994cbfdba3b" lucid_version="emulex.fc.fw.esxi70_bl@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This Firmware package contains following firmware versions:</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE 16Gb LPe1605 Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>16Gb</td>
			<td>12.8.352.12</td>
			<td>12.8.352.12</td>
			<td>12.8.352.10</td>
			<td>12.8.352.5</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE LPe1205A 8Gb Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>8Gb</td>
			<td>12.60a4</td>
			<td>2.10X6</td>
			<td>12.6.284.0</td>
			<td>12.6.302.0</td>
		</tr>
		<tr>
			<td>HPE 16Gb LPe1605 Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>16Gb</td>
			<td>12.6.275.12</td>
			<td>12.6.275.12</td>
			<td>12.6.275.7</td>
			<td>12.6.271.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f3decdb759d4bafa6df9af42f08e497" version="1b3747deffb24a5eb716443fe8745b98" lucid_version="VK0240GEPQN_VK0480GEPQP_VK0960GEPQQ_x64@HPG1(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="85555c0bf7a54baebd117b6f0dbd865a" version="561e12c2d63948df9ea20a9854feac64" lucid_version="MB1000JVYZL_MB2000JVYZN_MB3000JVYZP_x64@HPD3(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4c4e15e3e8d243efae5ab2580b253cde" version="8f2a5907322c4d90a294eef9cedc909a" lucid_version="Shenandoah.win2019.x64@7.716.3.0-rev2__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="7.716.3.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.716.3.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial build</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0720b596fe34472ebce943ceb259ae5a" version="4a872bdd6e2a4f0cace215643309cf8c" lucid_version="Gen10Plus_UBM3_Backplane_PIC.Esxi@1.20__sc-linux-fw-array_en"/>
      <revision_history>
        <revision>
          <version value="1.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial release</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2ed4fb56e81f45b0b8ae601a61b78e6c" version="f4dc0a0dbb32404c84435b00ce283016" lucid_version="bnxt.sles15@1.10.2-218.0.67.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.10.2-218.0.67.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports SUSE Linux Enterprise Server 15 Service Pack 2</li>
	<li>This product now supports PAM4 speeds information in&nbsp;ethtool tools&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses an issue where system crashed on doing driver unload load in loop when running broadcast traffic</li>
	<li>This product addresses an issue where bnxt_en module crashes with NULL pointer deference before ifup(bring up network interface)</li>
	<li>This product addresses an issue where kernel panic after PCIe AER(Advanced Error Reporting) device recovery successful</li>
	<li>This product addresses an issue where bnxt_en crashes with NULL pointer dereference when enabling SRIOV</li>
	<li>This product correct an error where ethtool -S tx_bytes and rx_bytes counter values far exceed actual values</li>
	<li>This product correct an error message when querying hwmon temperature on VF via sysfs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.10.1-216.0.169.4" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now not support user establishing connections using RDMA communication manager(CM) when Priority-based Flow Control (PFC) configured VLAN ID is 0</li>
	<li>This product now sets Maximum Transmission Unit(MTU) default value from firmware returned value</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue which offload is not happening on bond(vf and virtio) interface after the fail over with VF as the active slave</li>
	<li>This product corrects an issue which driver loading failed on kdump kernel.</li>
	<li>This product corrects an issue which RoCE driver causes input&ndash;output memory management unit(IOMMU) warnings</li>
	<li>This product corrects an issue which RoCE Link Aggregation (RoCE LAG) when Maximum Transmission Unit(MTU) was changed.</li>
	<li>This product corrects an issue which Link up failed after resuming from hibernation</li>
	<li>This product corrects an issue which Virtual Function RoCE driver causes Virtual Machine to be rebooted.</li>
	<li>This product corrects an issue which HPSUM selects driver for SUSE Linux Enterprise Server 15 while SPP deployment running with SUSE Linux Enterprise Server 15 Service Pack 1 platform.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9f645709728442bbae04d049c43912b7" version="f2b5c50aa2a34f64aa239eb5e3553078" lucid_version="U19.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled (TXT is disabled by default). This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d9e09b131d654a8aa7aba135504d8639" version="e8e9ae0a703a43029c95c39b551ea81f" lucid_version="P89.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0d53f18d93f34c14a12850b4c4f5646a" version="f0244aa08bb34cd5927e02cb83731038" lucid_version="EG000600JWFUV_EG001200JWFVA_x64@HPD3(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (E)" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="58058fc7c39a49caa2844dbe139ab3f9" version="4dc4035f627f4344abfa6c7924044fbc" lucid_version="EG001800JWJNR_EG002400JWJNT_ESXi@HPD5(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1645a3fa489f4a55a83d6b3479318292" version="97d34d3cb6e74f8e8e4ee4ac61bcf14a" lucid_version="ixgbevf_bl.rhel8@4.9.3-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9.3-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 8, Updates 2&nbsp;and 3.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue seen when enabling SRIOV, where the VFs have the same, duplicated MAC address.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.6.2-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f1f8da98d16b4dea87d58e2bbca62959" version="97e24666c65744f38ea294829dcb2217" lucid_version="MLNX_VPI_CX6_HCA_MFT_FW_package.esxi67@1.0.1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 20.29.1016:</strong></p>

<p>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21<br />
&nbsp;</p>

<p><strong>New Features and Changes in Version 20.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.</li>
	<li>To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.</li>
	<li>Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.</li>
	<li>Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 20.27.6008:</strong></p>

<p>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21<br />
&nbsp;</p>

<p><strong>New Features and Changes in Version 20.27.6008:</strong></p>

<ul>
	<li>The following are the minimal software/firmware versions that support PAM4 link speeds when&nbsp;connected using Mellanox NIC to Mellanox Switch and Mellanox NIC to 3rd Party Switches:
	<ul>
		<li>Mellanox Onyx: 3.9.0830-038</li>
		<li>ConnectX-6: 20.27.2008*<br />
		*Note: NICs with this firmware version support Mellanox-to-Mellanox connectivity with PAM4 link&nbsp;speeds.</li>
	</ul>
	</li>
	<li>Added support for the following features:
	<ul>
		<li>Enabled KP4RS FEC on Active Fiber cable up to 30m.</li>
		<li>FDR protocol.</li>
		<li>Enabled updating End-to-End (E2E) credit packets instantly.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>There are no new fixes in firmware version 20.27.6008.</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="73c467f62ccd4e6c837bbb93fd6013e1" version="5ef23b1092454b9882f6774145a3d341" lucid_version="VO001000KWJSE_VO002000KWJSF_VO004000KWJSH_VT00_x64@4ICDHPK1__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4ICDHPK1" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.</li>
	<li>After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1e4f77062f4d48c8906f4212d8016a76" version="6776922b80e843cb95c774a1f03796c9" lucid_version="a48.linux@2.40_02-24-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-24-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support for AMD EPYC 7003 processors.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.<p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f47f99ce0a3d4f73a3af884b56c63c54" version="6504a78770e4442db9a48c665739b35f" lucid_version="EG0300JFCKA_EG0600JEMCV_EG0900JFCKB_EG1200JEM_ESXi@HPD6(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="10fb5093c8b24e83a8541c8c40bc7e15" version="07f22d5bbb7e4f68aca19c3d138c3fa8" lucid_version="EH0300JEDHC_EH0450JEDHD_EH0600JEDHE_ESXi@HPD4(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e6ce1a91bd5b4f829c98f53210189206" version="6ad4ca3a64254073bbe3f33279030352" lucid_version="MB012000GWTFE_MB014000GWTFF_ESXi@HPG7(B)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG7" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG7" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware revision improves low-temperature performance and Error Correction Code (ECC) error recording for some commands.&nbsp;</li>
	<li>It also improves internal logging capabilities for failure analysis.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3129a8bb92a043939b7bf306836723ed" version="58e5417a5fbc4932b7450bf655ca2fbb" lucid_version="ocsbbd.linux_x86_64@1.1.85.0-1(B)-rev1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.1.85.0-1" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>SUM no longer attempts to install this product on Gen10 servers, which this product&nbsp;does not support.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fixes an issue that it takes long time to boot-up server due to ocsbbd service.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.1.85.0-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>SUM no longer attempts to install this product on Gen10 servers, which this product&nbsp;does not support.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fixes an issue that it takes long time to boot-up server due to ocsbbd service.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="00184010ed0a41829836f7c60269273f" version="57f83b71a4454c1eb93347426adf1000" lucid_version="MLNX_Ethernet_Only_NIC_FW_package.x64@1.0.0.14__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.14" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5044 :</strong></p>

<p>&nbsp; &nbsp;779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)<br />
&nbsp; &nbsp;779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.29.1016:</strong></p>

<p>&nbsp; &nbsp;817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.29.1016:</strong><br />
&nbsp; &nbsp;817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</p>

<p><strong>Firmware for the following device is updated to 16.29.1016:</strong></p>

<p>&nbsp; &nbsp;874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</p>

<p><strong>New features and changes in version 16.28.1016:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New features and changes in version 14.29.1016:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction:
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes submitted in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.29.1016:</strong></p>

<ul>
	<li>The sent packet hung while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>The completions (CQ)completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.&nbsp;</li>
	<li>The fragmented IP packets were dropped.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.13" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5044 :</strong></p>

<p>&nbsp; &nbsp;779799-B21 (HP Ethernet 10G 2-port 546FLR-SFP+ Adapter)<br />
&nbsp; &nbsp;779793-B21 (HP Ethernet 10G 2-port 546SFP+ Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.27.4000:</strong></p>

<p>&nbsp; &nbsp;817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.27.4000:</strong><br />
&nbsp; &nbsp;817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</p>

<p><strong>Firmware for the following device is updated to 16.27.2008:</strong></p>

<p>&nbsp; &nbsp;874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</p>

<p><strong>New features and changes in version 16.27.2008:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New features and changes in version 14.27.4000:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction:
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes submitted in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.27.4000:</strong></p>

<ul>
	<li>The sent packet hung while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>The completions (CQ)completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.&nbsp;</li>
	<li>The fragmented IP packets were dropped.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="56e73eced8704b9c871e50e0afbcdc84" version="fe788d7f24234926b2330543b27d3985" lucid_version="U15.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="596340d3247946aaa109faeb065a7eab" version="65ec087b7cd14d1680d8397416f24010" lucid_version="MB008000JWRTD_x64@HPD1(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ab42380273374a988dbcb1a25432ed96" version="8163e8ff503043d3b9272f24d5dd3be8" lucid_version="FWPKG-P31324-B21@20.29.1016__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.29.1016" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New Features and Changes in Version 20.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.</li>
	<li>To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.</li>
	<li>Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.</li>
	<li>Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.29.1016:</strong></p>

<ol>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ol>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1c10253696bc48458c2c8df4ff0d1b8d" version="2348ce5d66cc4b4a9083a6dc2f9d03b9" lucid_version="emulex.cna.fw.lin.x64_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp;have separate components to update fibre channel and converged network adapters.&nbsp; This is a converged network adapter update component.</p>

<p dir="LTR">Updated CNA (XE100 series) firmware</p>

<table border="1" cellpadding="1" cellspacing="1" style="width:800px">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Firmware</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 10Gb 2-port 556FLR-T Adapter</td>
			<td>10Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</td>
			<td>10Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE CN1200E Dual Port Converged Network Adapter</td>
			<td>20Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;CN1200E-T Dual Port Adapter</td>
			<td>20Gb</td>
			<td>12.0.1336.0</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp;have separate components to update fibre channel and converged network adapters.&nbsp; This is a converged network adapter update component.<br />
<br />
Updated CNA (XE100 series) firmware&nbsp;</p>

<p><strong>Firmware</strong></p>

<p>Contains:<br />
CNA (XE100 series) firmware 12.0.1280.5</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<p>UEFI:</p>

<ul>
	<li>HPE FlexFabric 20Gb 2-port 650FLB Adapter and HPE FlexFabric 20Gb 2-port 650M Adapter&nbsp;does not complete&nbsp;to create boot source on 2nd port</li>
</ul>

<p>Firmware:</p>

<ul>
	<li>Light Emiiting Diode(LED) is in&nbsp;invalid state when disable the port under Unified Extensible Firmware Interface (UEFI)</li>
	<li>Duplicate Entries found in firmware report under NIC details for few adaptors.</li>
	<li>Full adapter name is not displayed for HPE FlexFabric 20Gb 2-port 650M Adapter&nbsp;in some Rom Based Setup Utility (RBSU).</li>
	<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
</ul>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6243eef4eb164aedb3860ce40f4d445d" version="a4c98163f9fe4401bac32d65fb6b00ca" lucid_version="U19.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled (TXT is disabled by default). This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cbed2371ac3f4cd6a3df13f0ee8daa7b" version="b496abadf7454f42b3bc0d877d1b84d8" lucid_version="VO1920JEUQQ_x64@HPD3(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="82096ac8d4894962ba9da2e42c289f41" version="f785df22355c47e382305915fb16d290" lucid_version="qlogic.online.fw.lin.x64_bl@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for&nbsp;16 Gb&nbsp;products.</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE QMH2672 16Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for 8 Gb and 16 Gb&nbsp;products.</p>

<p>&nbsp;</p>

<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1" style="width:800px">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td style="width:50px">UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE QMH2572 8Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE QMH2672 16Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>16Gb</td>
			<td>6.03.00</td>
			<td>8.08.231</td>
			<td>7.02</td>
			<td>3.43</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>Enhancements have been made to the firmware to prevent and better recover from the unexpected behavior described in Customer Advisory titled: &ldquo;HPE ProLiant, Synergy and Superdome Flex Host Bus Adapters (HBA) - Certain Fibre Channel HBA Firmware May Cause the Operating System to Halt and Potentially Compromise Filesystem Data Integrity&quot; at the following link:</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us</a></p>

<ul>
	<li>Address unexpected behavior when Fibre Channel adapters were simultaneously running traffic to an array which supports 3PAR Persistent Checksum AND another array which is running T10-PI (also known as T10-DIF) or no block checksum technology at all</li>
	<li>Fibre Channel adapter firmware versions were not showing up as expected in the AHS log.</li>
	<li>Port statistics counters would sometimes not update in the event of Loss of Signal or Loss of Sync</li>
	<li>link downs would occur during specific frame sequences used by the HPE XP8 array after array-side link loss</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d626b04e2b74450287a682c2c77ab027" version="4007c2a7be8f4144bf5cc73e04728513" lucid_version="MLNX_IB_Only_CX4_CX5_HCA_FW_package.x64@1.0.0.7__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.28.1002:</strong></p>

<p>843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)<br />
<br />
<strong>New Feature and Changes in Version 12.28.1002:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><br />
<strong>Firmware for the following devices are updated to 16.29.1016:</strong></p>

<p>872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)<br />
872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of the cluster.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compared to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Steering DP hash flow groups.</li>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>PCIe Rx modifications to prevent the adapter cards from disappearing from the system.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
	<li>cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>[Beta]&nbsp;Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that prevented&nbsp;VXLAN packets with svlan/ cvlan tag from being matched.</li>
	<li>An issue that caused the&nbsp;eth_wqe_too_small counter to count&nbsp;ODP (On-Demand Paging) page faults.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>&nbsp;Ani ssue that resulted in low performance after enabling the RoCE Accelerator capability. Note:&nbsp;The fix is available when all ports are set as Ethernet.&nbsp;</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.</li>
	<li>An issue that caused&nbsp;the device to go to down IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.&nbsp;</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.28.1002:</strong></p>

<ul>
	<li>An issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.27.4000:</strong></p>

<p>843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)<br />
<br />
<strong>New Feature and Changes in Version 12.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><br />
<strong>Firmware for the following devices are updated to 16.27.2008:</strong></p>

<p>872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)<br />
872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observered while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="de4e8e44a39b461c93ece5604d26abfa" version="992aaa7de14341ec97fd6c34fa58fda1" lucid_version="brcmfcoe.rhel8.x86_64@12.0.1342.0__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1342.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1259.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="41fb5700b0aa44b2bbeca072e083be4b" version="229190e36c8e41038d9755174ae657c2" lucid_version="MB2000JFEPA_MB4000JFEPB_ESXi@HPD5(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="99e0afc9d35746928c6cb34efe0c36a4" version="31bf8f81cd69481c9b7945fe858a3358" lucid_version="EG0300JEHLV_EG0600JEHMA_EG0900JEHMB_x64@HPD5(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bf1a27517d5b40049d86ae61d3476536" version="5f0ed977c6754cc99e3518b7db1e038a" lucid_version="nhpsa.esxi6.7_bundle@2021.01.01-rev1__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.01.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This release provides the following fixes:</p>

<ul>
	<li>Fix failed TUR cmds hung in queue</li>
	<li>Fix internal cmd reservation broken</li>
	<li>Update for new version number scheme</li>
	<li>Fix verbose error messages on common innocuous errors<br />
	&nbsp;</li>
	<li>Failed logical volumes not being properly handled via offline state.</li>
	<li>Scsi sense and status returns are incorrect for some error conditions.</li>
	<li>Incorrect &#39;unavailable&#39; status seen during hot-plug recovery.</li>
	<li>Displayed target ID is incorrect in some driver log messages.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2021.01.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>To add OS support for VMware ESXi 7.0 U1 P02</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This release provides the following fixes:</p>

<ul>
	<li>Fix failed TUR cmds hung in queue</li>
	<li>Fix internal cmd reservation broken</li>
	<li>Update for new version number scheme</li>
	<li>Fix verbose error messages on common innocuous errors<br />
	&nbsp;</li>
	<li>Failed logical volumes not being properly handled via offline state.</li>
	<li>Scsi sense and status returns are incorrect for some error conditions.</li>
	<li>Incorrect &#39;unavailable&#39; status seen during hot-plug recovery.</li>
	<li>Displayed target ID is incorrect in some driver log messages.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4bce5935b1b945eda51c9496e5f772b8" version="19d88394738945caaad5ab99fcb2458b" lucid_version="Sheldon_Gen10_EXP_Win@2.00(B)__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="2.00" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft&nbsp;Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="18e9f59fd9934421b3a1eafac327542f" version="1b321da1724a476ea717b25e056031ea" lucid_version="VO001920KWZQR_VO003840KWZQT_x64@HPK5-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2311760d35054ca48230493dff4b743b" version="38017fc23f0043f392a0f70a9e8fbfd6" lucid_version="EH0300JDYTH_EH0450JDYTK_EH0600JDYTL_ESXi@HPD6(I)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a1a3e71f172a45da8be70ea29ecf3efc" version="5cfa7432e0f941f8a62f5cb0e80fe790" lucid_version="nvmenmifix.gen9.win@1.0.5.0(C)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.5.0" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Windows Server 2019.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.5.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Changed component name to indicate which processors are supported. Systems that already have version 1.0.5.0 installed do not need to install this component.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="211fcef09ace432ba1e1c0cdad640eeb" version="6baddd8ca10843a1af59125ca65b8eef" lucid_version="EG000300JWFVB_x64@HPD2(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aa9211e645514db69ecc4a92d0863429" version="e2ab85ed3f5f4be0afcab0b49bed5024" lucid_version="Gen10_NVMe_Backplane_PIC.fwpkg@1.20__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="1.20" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7fe0be6bb4504cf8abf7b5506059ca0a" version="a455d6842b1144f399a1073e29a83e6c" lucid_version="pwrPICflash.DL580Gen8.VMware@4.1(E)__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver.&nbsp;4.1 (E) contains updates to the component packaging and is functionally equivalent to ver. 4.1. It is not necessary to upgrade with Revision&nbsp;E if a previous component Revision was used to upgrade the firmware to version 4.1.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This is the initial version of the firmware.</p>

<p><strong><strong>Known Issues:</strong></strong></p>

<p>The smart component prompts for reboot unnecessarily when the installation procedure is completed. Reboot is not required after installation for updates to take effect and hardware stability to be maintained.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>
 <b>Important Notes:</b><br />
 Ver. 4.1(D) contains updates to the OS installation support for HP Smart Update Manager. The Power Management Controller Firmware contained within Ver. 4.1(D) is Ver. 4.1. Therefore, it is not necessary to upgrade with ver. 4.1(D), if the Power Management Controller firmware version is 4.1.<br />
 <b>Firmware Dependencies:</b></p>
None
<p>
 <strong>Enhancements/New Features:</strong><br />
 This is the initial version of the firmware.<br />
 <b><b>Known Issues:</b></b><br />
 The smart component prompts for reboot unnecessarily when the installation procedure is completed. Reboot is not required after installation for updates to take effect and hardware stability to be maintained.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b52adb44d0e04f40a015897db8ad0e5d" version="00123ffa0fe845ec82b1edbe7da66656" lucid_version="EG0300JFCKA_EG0600JEMCV_EG0900JFCKB_EG1200JEMD_x64@HPD6(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1195ecfa03744617a13d6f9abdc72e2b" version="77c361a8c15e452fa8afc13119d81eb1" lucid_version="MB2000GFEMH_MB4000GFEMK_x64@HPG6(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="H" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.</li>
	<li>
	<p>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (G)" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.</li>
	<li>
	<p>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</p>
	</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="18633ffffaeb4435bcda138419e66c7a" version="2e686ee183e54553ab6d995be0666da7" lucid_version="U34.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f201f1f45a1041f9819da1901ffe255f" version="f0f83ef589d644f184432c9569268d0b" lucid_version="a42.linux@2.40_02-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p><p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.</p><p>Added driver and option to enable SmartRAID SW RAID support for direct attached SATA and NVMe drives.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the fan runs at a higher than expected speed after upgrading the firmware of HPE Smart Array E208i or E408i to version 3.0.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.38_10-30-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices.  This option would only be used for PCIe Adapters that support his level of bifurcation. <p>Added support to increase the maximum amount of system memory to 8TB.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the server may encounter an Uncorrectable Machine Check Exception (UMCE) with a Bank of 0x00000005 or an Uncorrectable PCI Express Error with status 0x00040000 or 0x00010000. These errors will result in either an unexpected reset of the server or the server becoming unresponsive (such as Blue Screen with Windows, Purple Screen with VMware, or Kernel Panic with Linux).  This revision of the System ROM includes the latest revision of AMD firmware which addresses this issue.  This issue is not unique to HPE servers.<p>Addressed a rare issue where the system may fail to boot after a warm reset.<p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.<p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3a074b488c7143aaa5904bb4840ab9e0" version="ddb33176642b49c3ac1f27b33d7e9555" lucid_version="MB2000GCWLT_MB3000GCWLU_MB4000GCWLV_ESXi@HPG4(J)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="J" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (I)" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bce1dc60182942cc938b19de857de7fd" version="b8192b6a9afc4ebeb5bbb0ca10e80b6d" lucid_version="D3000.fwsc.win_x64@5.04(B)__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.04" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v191363/D3000_v5.04B.html">&nbsp;<u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.04" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v177052/D3000_P07231-006.html">&nbsp;<u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4b7b12ad9577426297f04a5a3b37c6cd" version="10216f083659425cafcfe724420d90bb" lucid_version="emulex.cna.fw.esxi65_bl@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">Updated CNA (XE100 series) firmware</p>

<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650FLB Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650M Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e0a6e611d1444b4f8561da2a0566c408" version="0b54ea0754d34682977b7ff7c459353d" lucid_version="MK003840GWHTE_x64@HPG6(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d7cf155e76584b1f8fb8e3c7c222c90d" version="60927879ca7a450fbe12b5f9940492d9" lucid_version="MB008000GWRTC_x64@HPG1(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d480050a16674bf2aaea0c812270030a" version="08ff4eb6e58c446e9ee87c5b400ffb37" lucid_version="EG0300JEHLV_EG0600JEHMA_EG0900JEHMB_ESXi@HPD5(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4e3d7926d2c648d2b99239bbce77f310" version="5599dbd1e31f49f586691795c0e8911b" lucid_version="MO0400JFFCF_MO0800JFFCH_MO1600JFFCK_ESXi@HPD9(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="80a66dc62c31431baffb87b602c0feff" version="dc1aeece99ff4452bda39fd71e436350" lucid_version="MLNX_VPI_CX4_CX5_HCA_FW_package.esxi67@1.0.4__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.28.1002:</strong></p>

<p>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)<br />
825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 12.28.1002:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>Firmware for the following devices are updated to 16.29.1016:</strong></p>

<p>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)<br />
872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compared to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Steering DP hash flow groups.</li>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>PCIe Rx modifications to prevent the adapter cards from disappearing from the system.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
	<li>cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>[Beta]&nbsp;Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that prevented&nbsp;VXLAN packets with svlan/ cvlan tag from being matched.</li>
	<li>An issue that caused the&nbsp;eth_wqe_too_small counter to count&nbsp;ODP (On-Demand Paging) page faults.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>An issue that resulted in low performance after enabling the RoCE Accelerator capability. Note:&nbsp;The fix is available when all ports are set as Ethernet.&nbsp;</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.</li>
	<li>An issue that caused&nbsp;the device to go to down IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.&nbsp;</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.28.1002:</strong></p>

<ul>
	<li>An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.27.4000:</strong></p>

<p>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)<br />
825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 12.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>Firmware for the following devices are updated to 16.27.2008:</strong></p>

<p>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)<br />
872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observerd while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e3abad55c63d42f3bfc00d8212a8e9d4" version="d45dd9aea61147b88ebf7183fabe585c" lucid_version="EH000900JWHPK_EH000600JWHPH_x64@HPD4(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="02754226ca24415fbdc877dfe47af242" version="19b36e38f6da4fbb8e3696722a58e96a" lucid_version="P408i-p_P408e-p_P408i-a_P408i-c_E208i-p_x64@3.53-rev1__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="3.53" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added UBM type3 backplane support</li>
	<li>Added support for long device model/product ID for SATA drives.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li style="list-style-type: disc;">An issue where the controller might become unresponsive while receiving periodic I/Os.</li>
	<li style="list-style-type: disc;">Host I/O timeouts might occur due to continuing firmware attempts to discover devices during an expander configuration.</li>
	<li style="list-style-type: disc;">A controller lockup problem (with code 0x1E10) might occur when a bad drive with unsupported block size.</li>
	<li style="list-style-type: disc;">A Controller hangs when multiple hot-plug and hot remove events (drives or JBODs) were being processed.</li>
	<li style="list-style-type: disc;">A Controller hangs on Flash Backed Write Cache enabled logical drives with sequential read towards the end of the logical drive.</li>
	<li style="list-style-type: disc;">A Controller hangs when hot-plug physical drive with outstanding I/Os.</li>
	<li style="list-style-type: disc;">A controller hangs if a host I/O and background consistency check simultaneously encounter a RAID-1 ADM or RAID-10 ADM stripe in which all drives have URE&#39;s on the same LBA.</li>
	<li style="list-style-type: disc;">A Controller hangs when a drive is failed from a RAID6/60 logical drive when the host issues a Clear Controller Configuration command or any other configuration change command.</li>
	<li style="list-style-type: disc;">The SSD data drive might be set offline (with reason code 0x37) when hot-remove and re-insert during a spare rebuild in progress.</li>
	<li style="list-style-type: disc;">A drive might not be exposed to the OS if the system is rebooted just after the sanitize erase finishes.</li>
	<li style="list-style-type: disc;">UBM backplanes are not detected properly when connected to specific ports (port 7 or above) in the 12Gb SAS Expander Card.</li>
	<li style="list-style-type: disc;">A controller might hang when idle followed by a short burst of I/Os.</li>
	<li style="list-style-type: disc;">The controller might return the previous drive firmware version, after a drive firmware update on SATA drives.</li>
	<li style="list-style-type: disc;">The controller might fail drives (with reason code 0x49, I/O freeze timeout) during expander firmware upgrade on a multi-expander enclosure configuration.</li>
	<li style="list-style-type: disc;">Hot-added drive LED control fails on specific fan-out expander type external enclosure models.</li>
	<li style="list-style-type: disc;">Smart Array Essential series controller might not be responsive when processing sequential I/Os and the firmware coalescing logic can&#39;t get the memory.</li>
	<li style="list-style-type: disc;">Filesystem or application might read old data when SmartCache configurations encounter intermittent write I/O errors to a primary logical drive.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.53" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added UBM type3 backplane support</li>
	<li>Added support for long device model/product ID for SATA drives.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li style="list-style-type: disc;">An issue where the controller might become unresponsive while waiting for a non-existent pre-fetch queue entry.</li>
	<li style="list-style-type: disc;">Host I/O timeouts might occur due to continuing firmware attempts to discover devices during an expander configuration.</li>
	<li style="list-style-type: disc;">A controller lockup problem (with code 0x1E10) might occur when a bad drive with an unsupported block size is connected into slot 0.</li>
	<li style="list-style-type: disc;">A Controller hangs issue when multiple hot-plug and hot remove events (drives or JBODs) were being processed.</li>
	<li style="list-style-type: disc;">A Controller hangs issue on DDR caching enabled logical volumes with sequential read towards the end of the volume.</li>
	<li style="list-style-type: disc;">A Controller hangs issue with outstanding I/Os on a degraded logical volume when the physical drive fails.</li>
	<li style="list-style-type: disc;">A Controller hangs issue if a host I/O and background consistency check simultaneously encounter a RAID-1 ADM stripe in which all drives have URE&#39;s on the same LBA.</li>
	<li style="list-style-type: disc;">A Controller hangs issue when a drive is failed from a RAID6/60 logical drive when the host issues a Clear Controller Configuration command or any other configuration change command.</li>
	<li style="list-style-type: disc;">The SSD data drive might be set offline (with reason code 0x37) when hot-remove and re-insert during a spare rebuild in progress.</li>
	<li style="list-style-type: disc;">A drive might not be exposed to the OS after reboot if the system is rebooted just after the sanitize erase finishes.</li>
	<li style="list-style-type: disc;">UBM backplanes are not detected properly when connected to specific ports (port 7 or above) in an expander card configuration.</li>
	<li style="list-style-type: disc;">A Controller hangs issue when processing idle time followed by a short burst of I/Os.</li>
	<li style="list-style-type: disc;">The controller might return the previous drive firmware version, after a drive firmware update on SATA drives.</li>
	<li style="list-style-type: disc;">The controller might fail drives (with reason code 0x49, I/O freeze timeout) during expander firmware upgrade on a multi-expander enclosure configuration.</li>
	<li style="list-style-type: disc;">Hot-added drive LED control fails on specific fan-out expander type external enclosure models.</li>
	<li style="list-style-type: disc;">sequential I/Os and the firmware coalescing logic can&#39;t get the memory.</li>
	<li style="list-style-type: disc;">Filesystem or application might read old data when SmartCache configurations encounter intermittent write I/O errors to a primary logical drive.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e94dfd89626f4fc992d59a1c00e08f54" version="d69a6cc7c3084c1fab47e644a306ca31" lucid_version="MB006000GWJRR_MB008000GWJRT_x64@HPG4(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f97eb4848b18499fa1a1379ab7b46d05" version="a04941e9d08f4a53864e41990f761e50" lucid_version="esxi70-fc-enablement-sw-bundle-sc@2021.04.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Supports VMware ESXi 7.0 and ESXi 7.0 U1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6953e0081b4a4f67b00df8e63804d06c" version="f97501a3ed934331aa675dd41545b3ca" lucid_version="ixs.w2k12_r2@3.14.222.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="3.14.222.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.14.214.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="95f513b0af8c485bb6224e1108f86d03" version="65014c7645bc4bccabd545bbdb9f2ce3" lucid_version="qlogic_storport_x64.w2k19_bl@9.4.2.20__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="9.4.2.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version&nbsp;9.4.2.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.4.1.20" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;to&nbsp;version&nbsp;9.4.1.20</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>Memory dumps were not generated during a crash dump in a boot from SAN environment</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="571bc8d279024498916baff035cbe35c" version="06be4bb694964643a6b2119ad4e67d30" lucid_version="ixgbe_bl.rhel7@5.9.4-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.9.4-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7, Updates 8 and 9.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.6.4-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a6447acbde7f4368991a3df1503f91e8" version="02ca93ad6e504ee585b95eb59cc5c1eb" lucid_version="MB008000GWRTC_ESXi@HPG1(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="026326f2a6e64525ac6b82dd92bae1e8" version="a4dec67fa9664a5b9252cb1863340f4b" lucid_version="ixgben_bl.vmware70@2020.06.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.06.01" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3d448885a31a43a9b8495c6b5feb6d8e" version="d988e0e6b5434a4e83130c8b8b6831df" lucid_version="i40e.rhel7.x86_64@2.13.10-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.13.10-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 7 update 9</li>
	<li>This product supports new feature called software DCB(Data Center Bridging) which allows using DCB without firmware LLDP(Link Layer Discovery Protocol) agent being turned on.</li>
	<li>This product supports new feature which allows user to specify VLAN(Virtual Local Area Network) field and add it to flow director via ethtool</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses an issue where server hungs after loading XDP(eXpress Data Path) program in case of LLDP(Link Layer Discovery Protocol) agent disabled&nbsp;</li>
	<li>This product addresses an issue where it is not possible to change MAC(Media Access Control) address on VF(Virtual Function) from VM(Virtual Machine) when VF is in trusted mode</li>
	<li>This product addresses an issue where it cannot create VF(Virtual Function) VLAN(Virtual Local Area Network) interface inside a namespace&nbsp;</li>
	<li>This product addresses an issue where system crash during removing driver when VSI(VIrtual Station Interface) is in reset recovery mode</li>
	<li>This product addresses an issue where VF(Virtual Function) receives unicast packets from other VF</li>
	<li>This product addresses an issue where using Intel nvmupdate utility never ending update</li>
	<li>Thips product addresses an issue where kernel crash in vf driver(iavf) reset when pf driver(i40e) is removing</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.11.27-2" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue where the patched kernel symbol changed on PTP (Precision Time Protocol) module.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="be75bc90ea544ceea229c5a0eeef825c" version="56820fde659f4df79b44e3390f5dfd8f" lucid_version="MB1000GDUNU_MB2000GDUNV_MB3000GDUPA_MB4000GDUP_x64@HPG4(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e0019db6f6e24588a441b6cb4e743087" version="d466ff3ae06f4c4a9c3b432b2ae22d66" lucid_version="switchtec.pciesw.win.x64@12.52.0.676__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="12.52.0.676" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Support for Apollo 6500 Gen10 Plus XL675d and XL645d</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="836a010b07664062aae0167a44b26380" version="f7b8b9e21ea54850ad5ec819ec12f24c" lucid_version="Storcli-sut.esxi65@2021.04.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial build</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.09.00" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated Product&nbsp;Name with the OS version.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0dff23f4576342a7a89f59feeba0f4a1" version="4aec688aab964b72b6e3fde17aad5f93" lucid_version="Storcli-sut.esxi67@2021.04.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.00" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Build</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.09.00" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated Product&nbsp;Name with the OS version.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8e8482d9e6e6494a8e54ec40143d190a" version="8b3861aed8424b6ba84825a2bb5c6d1f" lucid_version="tg3.sles15@3.139b-2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.139b-2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Suse Linux Enterprise Server 15 Service Pack 2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The products fixes an a race condition issue where driver will still try to access the PHY(physical layer) although it was already brought down when the tg3 timer fires</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.138a-2" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports sles15 sp1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product fixes an issue where the SLES15 driver be selected by HPSUM deployment for SLES15sp1 OS<br />
This product now exports vendor and packager tag in RPM metadata<br />
This product addresses the issue where the SLES15 component always be selected by HPSUM deployment</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="17ede1952e7d40da9d3235daae0363d6" version="e6297f5e156d4732b93f943910470377" lucid_version="tg3.rhel8@3.139b-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.139b-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 8 update 2 and Red Hat Enterprise Linux 8 update 3</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The products fixes an a race condition issue where driver will still try to access the PHY(physical layer) although it was already brought down when the tg3 timer fires</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.138b-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 8 Update 1.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2cb6e0e14bb34d32a787920ab2722d11" version="604ce58911ec4ef2a75d6cbceb3879a2" lucid_version="Gen10Plus_UBM1_Backplane_PIC.Esxi@1.42__sc-linux-fw-array_en"/>
      <revision_history>
        <revision>
          <version value="1.42" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial release</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="65eb20c47c2e478992fc3cbe0ecae5a8" version="1cc225eb24184f62ad1d6622d599750f" lucid_version="MLNX_VPI_CX6_HCA_MFT_FW_package.esxi70@1.0.1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 20.29.1016:</strong></p>

<p>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21<br />
&nbsp;</p>

<p><strong>New Features and Changes in Version 20.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.</li>
	<li>To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.</li>
	<li>Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.</li>
	<li>Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 20.27.6008:</strong></p>

<p>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21<br />
&nbsp;</p>

<p><strong>New Features and Changes in Version 20.27.6008:</strong></p>

<ul>
	<li>The following are the minimal software/firmware versions that support PAM4 link speeds when&nbsp;connected using Mellanox NIC to Mellanox Switch and Mellanox NIC to 3rd Party Switches:
	<ul>
		<li>Mellanox Onyx: 3.9.0830-038</li>
		<li>ConnectX-6: 20.27.2008*<br />
		*Note: NICs with this firmware version support Mellanox-to-Mellanox connectivity with PAM4 link&nbsp;speeds.</li>
	</ul>
	</li>
	<li>Added support for the following features:
	<ul>
		<li>Enabled KP4RS FEC on Active Fiber cable up to 30m.</li>
		<li>FDR protocol.</li>
		<li>Enabled updating End-to-End (E2E) credit packets instantly.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>There are no new fixes in firmware version 20.27.6008.</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d31e8e30285a40108d05d6b3dc709695" version="e3f4998b35f64c2fa73c4ff4c265db07" lucid_version="MB010000GWAYN_MB008000GWAYL_ESXi@HPG5(F)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.  This issue was only found in supplier ongoing lab testing.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.&nbsp; This issue was only found in supplier ongoing lab testing.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cd60e68416444c61a56b3c63cb2d1ca3" version="e89875cb23e54b388c5423b545561ba0" lucid_version="D3000.fwsc.esxi@5.04(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="5.04" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v191363/D3000_v5.04B.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.04 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v177052/D3000_P07231-006.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c8a46fd2450f49dda4e8a0e964d64309" version="8af9eb67b1ec46d294e9cef42c0cdb51" lucid_version="emulex.cna.fw.esxi70_bl@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">Updated CNA (XE100 series) firmware</p>

<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650FLB Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650M Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0f2b8614c6ab40aea6c15cd633ff1402" version="0f809bebbc86404cb2cbc118a3b2bd83" lucid_version="MB001000GWJAN_MB002000GWFWA_MB004000GWFWB_ESXi@HPG1(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e72cd1a2f7704ea68d5be6e8ad810600" version="ba2983dc1ff940d39654c55d20978667" lucid_version="lpfc.rhel7.x86_64_legacy@12.8.352.11__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.275.14" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.6.275.14</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d8701885e8a84180a8d83022fac7f1e4" version="415d0748d7f84f5d8a110a3a54e079cd" lucid_version="iLO4_fw.Linux@2.77-rev2__sc-linux-fw-ilo_en"/>
      <revision_history>
        <revision>
          <version value="2.77" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support to display login banner SSH login</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Potential vulnerabilities in network stack. Click <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbhf04070en_us">here</a> to know more about the Security Vulnerabilities.</li>
	<li>Active directory test may fail during LDAP authentication.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.77" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support to display login banner SSH login</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Potential vulnerabilities in network stack. Click <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=hpesbhf04070en_us">here</a> to know more about the Security Vulnerabilities.</li>
	<li>Active directory test may fail during LDAP authentication.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7107cbc4cbe942d083f705a0dc0fece2" version="1a31828d7bf540a09c5515513d851b47" lucid_version="mlnx_en_roce.rhel8u2.x86_64.rpm@4.9(A)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.9" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="65b84b051d254111871da2f18ceee59a" version="2eb30aff9f37429bafadc3d23d126783" lucid_version="i36.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled (TXT is disabled by default). This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c4098b5f60c74084bd367e95f9010c52" version="70ef2cf304f84ee5bf3810e0fed98cd5" lucid_version="Mesa_Verde_P824i-p_Win@24.23.0-0043(A)__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="24.23.0-0043" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Over-temp issue was a false IML due to a &gt;=60C threshold, modified the threshold to &gt;65C in new version.</p>

<p>Please reference Customer Advisory <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00101958en_us" style="color:#0563c1; text-decoration:underline">a00101958en_us</a></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="24.23.0-0042 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes Firmware&nbsp;downgrade issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="37b8041b7e7643398842e72c780d3745" version="a0e2947d38b34c798d7b79234db5f498" lucid_version="Congaree@03.01.00.006-rev1__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="03.01.00.006" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="03.01.00.006" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7f5cc2735e814d67a516e6e72cb03eec" version="586dd67a33284f908928a3ab896ac6f8" lucid_version="SmartPqi.win@106.278.0.1043__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="106.278.0.1043" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>When executing a &ldquo;PCS-E2Launch&rdquo; the system cause stop responding due to the internal controller command accessing the cmdinfo SRB.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="106.190.4.1062" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Added an enhancement to fix the stale Drive fi&nbsp;rm&nbsp;ware version returned by a Power Shell command.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">This release provides the following fixes:&nbsp;</p>

<ul style="list-style-type:disc; margin-left:0px; margin-right:0px">
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">Fixed an issue where the early completion of the SRB_FUNCTION_SHUTDOWN SRB is in dump mode&nbsp;</p>
	</li>
</ul>

<ul style="list-style-type:disc; margin-left:0px; margin-right:0px">
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">The driver was not setting the feature bit to inform the controller to return a unique WWN ID per SATA drive via Inquiry VPD 0x83 rather then returning WWN ID per SAT drive port.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">While executing HCK CHAOS test,&nbsp;SmartPQI&nbsp;driver crashes with&nbsp;bugcheck&nbsp;0x7A (KERNEL_DATA_INPAGE_ERROR).&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">While rebooting, the&nbsp;SmartPQI&nbsp;driver crashes with&nbsp;bugcheck&nbsp;0xD1&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">An issue&nbsp;where Sleep test causes the&nbsp;SmartPQI&nbsp;driver to trigger a&nbsp;bugcheck&nbsp;0xD1.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">Fixed an issue while executing driver disable/reinstall, the&nbsp;SmartPQI&nbsp;driver crashes with&nbsp;bugcheck&nbsp;0xD1&nbsp;</p>
	</li>
</ul>

<ul style="list-style-type:disc; margin-left:0px; margin-right:0px">
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">Fixed an issue where the application hangs due to lost command. When issuing &quot;Get-Disk&quot; from&nbsp;Powershell, the command would eventually hang indefinitely.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">Fixed the registry lookup for determining where I/O is completed was using the string&nbsp;&quot;&nbsp;SubmitViaStartIo&nbsp;&quot; instead of &quot;&nbsp;CompleteIoInDpc&nbsp;&quot;.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">Fixed an issue where while executing sleep, the windows&nbsp;SmartPQI&nbsp;driver crashes with&nbsp;bugcheck&nbsp;0x7E.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">Fixed an issue where the system would BSOD when doing unnecessary initialization of the multi-tag table after declaring controller lockup.&nbsp;</p>
	</li>
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">Fixed an issue that causes a DRIVER_POWER_STATE_FAILURE BSOD&nbsp;</p>
	</li>
</ul>

<ul style="list-style-type:disc; margin-left:0px; margin-right:0px">
	<li>
	<p style="margin-left:0px; margin-right:0px; text-align:left">Fixed an issue where assert did not take into account hibernation/sleep mode where the driver limits the max I/O setting.&nbsp;</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="064d24a671684c77b993cf50aaac78a7" version="ff3d86a5886a4a78b2b033fccd5d4745" lucid_version="megaraid_sas.sles15.x86_64.rpm@07.706.05.00-14__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="07.706.05.00-14" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added ProLiant features support (Megacell status, AHS, Spade, Sanitize &amp; Expander)</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="07.706.05.00-13" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for Microsoft Windows Server 2019.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b4be4739aaa741bf83254d24ca921fd7" version="d23ec803438c4ffeb8ce030a5d30e32a" lucid_version="VK007680GWSXN_ESXi@HPG2(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f12cb892007944f694736d03ec00543c" version="3fb05e6d4b924fb4956066d5970b7eb1" lucid_version="VO000800JWZJP_VO001600JWZJQ_VO003200JWZJR_x64@HPD4__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modify Drive Vendor Identification String (VID) in Inquiry page from &ldquo;HP&rdquo; to &ldquo;HPE&rdquo;.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Increased Queue Size from 32 to 128 to be equal to the max number of chips.</li>
	<li>Refresh NM SRAM area periodically only when idle as a possible work around on NM SRAM parity error.</li>
	<li>Change the error response as 0x3 (SP_Busy) or 0x07 ( NO_SESSION_AVAILABLE) when host attempts to open another session while a session is already opened.</li>
	<li>Disable verify compare if APP_CHK=0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e7ac9bd0dae24b7e9605737bb695f64d" version="6b10913d6c864a6592e3e10c90e4fb35" lucid_version="be2net.rhel8@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product now supports Red Hat Enterprise Linux 8 Update 2 and&nbsp;Red Hat Enterprise Linux 8 Update 3</li>
	<li>This product now supports elx_net_install.sh installation script to install be2net driver on Red Hat Enterprise Linux 8 Update 1 or later.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1280.17-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eb650e36c9b84eb1b7c6c75d7ff3e9f2" version="96f86dd2f93c48e982a3f94cb9ec997d" lucid_version="MB004000JWWQB_MB002000JWWQA_MB001000JWWPV_x64@HPD4(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update includes a fix that prevents unrecoverable read errors in highly localized write intensive workload, and a new servo code revision that improves performance under specific vibration conditions.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a52a8072bd114cfd99c6c7548b2a473e" version="9af5fdd36d8b4bf5bc80e46a1491f7ce" lucid_version="hpdsa.esxi6.7_bundle@2019.05.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2019.05.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixes an issue where the driver will not upgrade due to the AHCI driver taking priority.</p>

<p>&nbsp;</p>

<p>This issue is only encounter when upgrading to version 2018.10.18&nbsp;(5.5.0.66-1). All other versions are not affected</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2018.10.18" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixes an issue where the driver could report excessive errors in the debug log.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b24d5f9d7d1b43c1891a12ff33223756" version="750afe0d22cf456780a3ea7f4ae3202b" lucid_version="EG0600JETKA_EG0900JETKB_EG1200JETKC_x64@HPD7(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a49dd08da845410cb98aa24a3deb45b2" version="48d7c58bae8b48bf938ccf887cc4cff8" lucid_version="Gen10Plus_UBM3_Backplane_PIC@1.20__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial release</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="169b01f1c4c245bc854a8424af9a5f85" version="ec5f43ea94a048908364de846d69b1cd" lucid_version="U31.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3992c4a617964c62b374bf1d689252da" version="db0b46a1cfe44d3da8629e3653554869" lucid_version="lpfc.driver.esxi67.zip_bl@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.8.317.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version &nbsp;12.6.182.2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>One port of an Fibre Channel adapter could not complete to reconnect to storage after storage upgrade if the host system had been online for over 3 months</li>
	<li>Turning on 3PAR Persistent Checksum after the host operating system was running would not result in Persistent Checksum being enabled between the adapter and 3PAR array.</li>
	<li>Virtual Machines (VMs) could not access certain storage arrays when those arrays were attached to the VM using N-Port ID Virtualization (NPIV)</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2e589cc6a48f40eaa0870785c3351832" version="9880e7bc4a714e3da90ca7b61629d849" lucid_version="U37.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d39d0611a5e74799a9f08e5f5809ddba" version="9e9b966c5dd84e5496dd5443a86b7e04" lucid_version="EH0300JDXBA_EH0450JDXBB_EH0600JDXBC_ESXi@HPD5(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="63a556e6179b4101ae6472eac493f29b" version="5e1088f7f0a74be489d1e4b3c9c6a8b2" lucid_version="emulex_linux_smartsan_enablement@1.0.0.0-4(f)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.0-4" revision="f" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to SLES15SP1</p>

<p>Updated to version 1.0.0.0-4</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.0-4 (e)" revision="e" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to SLES15SP1</p>

<p>Updated to version 1.0.0.0-4</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c0403221bbc14b609f9dc339f216be5e" version="f0f7655b9850456fa45c97b78219bdb5" lucid_version="MM1000GFJTE_ESXi@HPG5(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="261c2f9a8f584fd69c7ae5c1643322e4" version="2eb3ed88b6e2493bbea4f42547c5c6e1" lucid_version="MK000240GWKVK_MK000480GWJPN_MK000960GWJPP_MK0_ESXi@HPG5(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a rare link loss issue and adds enhancements for drive reliability.</li>
	<li>After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.</li>
	<li>The new drive bootloader code will be activated after the next drive power cycle.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us</a></li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (D)" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a rare link loss issue and adds enhancements for drive reliability.</li>
	<li>After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.</li>
	<li>The new drive bootloader code will be activated after the next drive power cycle.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b2d8d2ad18164775b6ab15fb40652791" version="f1c6857461cb46bfb889ef62c3e9a5fa" lucid_version="MB4000JEQNL_MB6000JEQNN_x64@HPDB(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDB (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="15b8ab8f16cc44ddb79fc673833826dc" version="5cacb7ec8bb545b3ae73d9dc527c47af" lucid_version="MB006000GWBXQ_MB008000GWBYL_x64@HPG8(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e774fea9b642407a9f2687df296d352e" version="8dd3d9b9dea24c70998a024a2d8c2510" lucid_version="iavf.w2k19@1.12.9.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.12.9.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation library iavfmsg.dll.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.7.119.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="197f33c3224544b3a3519e65de72192d" version="587a72128f6e4e988348d9183b89f9d9" lucid_version="MB4000GEQNH_MB6000GEQNK_x64@HPGB(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGB" revision="H" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.</li>
	<li>
	<p>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGB (G)" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.</li>
	<li>
	<p>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</p>
	</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e9a54d5b255e4c18936eebffaaff1ccf" version="4bbc727ad175430eb09131efa45b80f4" lucid_version="ams.win.x64@2.41.0.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.41.0.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added Logical Drive Trap&nbsp;5023.</li>
	<li>Added support for new I/O cards.</li>
	<li>Changed IDE/SATA interval time from 120 seconds to 60 seconds.</li>
	<li>Redirect more iLO security logs to the Windows event system.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed IML was missing NIC link down record if the user unplugs many cables at the same time.</li>
	<li>Fixed iLO web GUI missing IPv6 address when Windows Hype-V switch is created.</li>
	<li>Fixed a crash issue when AMS is querying iSCSI information.</li>
	<li>Fixed incorrect drive status if IDE SATA drive is busy on access.</li>
	<li>Fixed incorrect drive status if Windows see&nbsp;the predictive failure drive.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.30.2.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>1. Fixed the logging issue (It causes a no responding problem when AMS receives IML from iLO).&nbsp;<br />
2. Fixed unexpected SNMP Trap 11020 health status.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2b02357c33734bfeaaf1c4331f948d7c" version="67421128b90e425a88d7ffedc6cd163e" lucid_version="lsi-mr3.esxi6.5_bundle@2019.12.13__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2019.12.13" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Addressed a vSAN Fault Tolerance test failure seen in JBOD mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2018.06.04" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added ProLiant features support (Megacell status, AHS, Spade, Sanitize &amp; Expander)</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c8581e07bdde4d5584c0276be971751e" version="f8ec7c07e1914af789431004056702ec" lucid_version="amsd_rhel8@2.4.1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.4.1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This release contains the following enhancements:</p>

<ul>
	<li>Enhance the robust communication with iLO. The enhancement has a proper process exist and OS signal handling.</li>
	<li>Enhance the SMA logging system for better recording of the communication events.</li>
	<li>The AMSD reports the Open NIC controllers SN to align with iLO for avoiding the un-sync information.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed a small amount of memory leak as outlined in the Customer Advisory,&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00053824en_us">a00053824en_us</a></li>
	<li>A customer may experience where smad may periodically report: No response from iLO for Hello.&nbsp; After losing connection with iLO, the subagent may experience&nbsp;high CPU utilization for trying the reconnection. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us</a>.&nbsp;</li>
	<li>The cpqIde service not able to start while the AMSD configuration is agent mode.</li>
	<li>Addressed&nbsp;buffer overflow issues in select&nbsp;corner cases.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.3.1" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following item:</p>

<ul>
	<li>A customer may experience smad periodically reporting:&nbsp;No response from iLO for Hello.&nbsp; After losing connection with iLO, the subagent may experience&nbsp;high CPU utilization for trying the reconnection. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us</a>.&nbsp; Customers experiencing this issue are requested to update to amsd version 2.3.1.&nbsp;&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="170e9646d84b43c984c43d017aedc665" version="e4a25f04c2264ba29d2b381b9a421b37" lucid_version="U34.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="29dd95234723495d9d82f8b70f154b42" version="53ca2f27de6f44cfb3eef34de7fef182" lucid_version="be2iscsi_bl.rhel8@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 8, Updates 2&nbsp;and 3.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2a892367c12c496b8bd5b582e399209d" version="a53f960ade5f4e5f8a0b75722d89ec05" lucid_version="ql_iscsiuio_bl.rhel8u0@2.11.5.13-3(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.11.5.13-3" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product has&nbsp;been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.11.5.13-3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6a808075e9fa4bc19e7d11fd17511784" version="c9bed7b8cfef414b87422e6d0d8fb966" lucid_version="MZXL5800HBHQ-000H3_MZXL51T6HBJR-000H3_MZXL53T_ESXi@MPK73H5Q-rev1__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="MPK73H5Q" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="MPK73H5Q" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting .</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="926e3abf2abf49c2929e347ad48989a8" version="71d88fc5be0b4f3da67415ecaf19480c" lucid_version="PICGen9.VMware@1.0.9(K)__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.9" revision="K" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.9(K) contains updates to the component packaging and is functionally equivalent to ver. 1.0.9. It is not necessary to upgrade with Revision K if a previous component Revision was used to upgrade the firmware to version 1.0.9.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addresses an issue in which the minimum power capping value was incorrectly being calculated on certain systems. This fix increases the accuracy of the minimum capping value set during POST.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.9 (J)" revision="J" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.9(J) contains updates to the component packaging and is functionally equivalent to ver. 1.0.9. It is not necessary to upgrade with Revision J&nbsp;if a previous component Revision was used to upgrade the firmware to version 1.0.9.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addresses an issue in which the minimum power capping value was incorrectly being calculated on certain systems. This fix increases the accuracy of the minimum capping value set during POST.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="19705487dac745ff98bd9969d9ff7a10" version="4587a177c31a4ad8b998ae9b0542f570" lucid_version="VS000480KWDUP_VS000960KWDUQ_MS000400KWDUR_x64@HPK4(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f6a0af7aeed5453599816388663b56a0" version="9cf80e2503ec4f6fb4b30c4bfde5ae28" lucid_version="VO001920KWZQR_VO003840KWZQT_x64@HPK5-rev1__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="39ff5edbf84841ed9b674290e10d1356" version="8099ce2a0816484f89942763c2799f3e" lucid_version="u22.linux@2.90_11-27-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.90_11-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode: 0x000000E2 (CPUID 506E3). This Intel microcode patch provide mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-8696 and CVE-2020-8698. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381. These issues are not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.88_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9).<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381 and INTEL-SA-00389. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9). These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="da435657efe64ff1a664870254b46a1c" version="8296014148e54d1fa3a85366e03bb0dd" lucid_version="FWPKG-P23664-B21@20.29.1016__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.29.1016" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New Features and Changes in Version 20.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.</li>
	<li>To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.</li>
	<li>Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.</li>
	<li>Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.29.1016:</strong></p>

<ol>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ol>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1d65ef8868044e08a92676108c2b60af" version="879e4b916c854b5b8620cdb6a0e0629a" lucid_version="qlogic.online.fw.esxi65_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE 81Q 8Gb PCIe Fibre Channel Host Bus Adapter &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE 82Q 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE 84Q 8Gb Quad Port&nbsp;Fibre Channel Host Bus Adapter&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE SN1000Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
		<tr>
			<td>HPE SN1000Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1600Q 32Gb Single Port&nbsp;Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1600Q 32Gb Dual Port&nbsp;Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>02.04.07</td>
			<td>09.06.02</td>
			<td>7.11</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1610Q 32Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>02.04.07</td>
			<td>09.06.02</td>
			<td>7.11</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for 8 Gb,&nbsp;16 Gb and 32 Gb&nbsp;products.</p>

<ul style="list-style-type:square">
	<li>8Gb&nbsp;Fibre Channel Host Bus Adapter:
	<ul>
		<li>Package 3.82.00</li>
		<li>Firmware 8.08.207</li>
		<li>UEFI 7.00</li>
		<li>BIOS 3.56</li>
	</ul>
	</li>
	<li>16Gb&nbsp;Fibre Channel Host Bus Adapter:
	<ul>
		<li>Package 6.03.00</li>
		<li>Firmware 8.08.231</li>
		<li>UEFI 7.02</li>
		<li>BIOS 3.43</li>
	</ul>
	</li>
	<li>32Gb&nbsp;Fibre Channel Host Bus Adapter:&nbsp;&nbsp;
	<ul>
		<li>Package 02.03.06</li>
		<li>Firmware 09.04.01</li>
		<li>UEFI 7.08</li>
		<li>BIOS 0.0</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dac1034844fb4856950db71b5b2c959d" version="84030a6b355e4e88898bcd7a79cd2caa" lucid_version="i40ea.w2k19@1.13.104.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.13.104.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an traffic packets making cert failure seen when packets transferred to VLAN after RDMA function enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.171.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product added implementation of Advanced Link Speed functionality in Physical Function (PF) driver that are supports dynamic link speed changes.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which Blue Screen of Death （BSOD） (0x133) occurred with Remote Access Role service during shutdown.</li>
	<li>This product correct an issue which system crashed after few modifying Intel&reg; Advanced Network Services (Intel&reg; ans) Team type with tagged Virtual Local Area Network (VLAN).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="957f29fa54a8424d9d2bb2a2851bdb01" version="a32b530800ed48e1b2c6c24bcfddb559" lucid_version="elxiscsi_bl.vmware65@2019.12.20__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2019.12.20" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cbe5961cc6764856bfc9b1b69b78fe4d" version="51c86cb16f4e4611853f4692b84ff444" lucid_version="nicfwupg_intel_bl.vmware@1.2.3__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.2.3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports VMware vSphere 7.0 U1.<br />
This product now supports VMware vSphere 6.7 U3.<br />
This product now supports VMware vSphere 6.5 U3.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.1.2" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports VMware ESXi&nbsp;7.0.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="779f4f17fec64b6b9acf9ede668fc68a" version="167175a76e8b42c8995b657bcfb4541f" lucid_version="EG000300JWSJP_EG000600JWJNH_EG001200JWJNK_x64@HPD2(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f8437d6127664644832d2cd688d58903" version="e2a50fa7e57f44088604230979e0143a" lucid_version="A40.win.x64@2.44_10-29-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.44_10-29-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices. &nbsp;This option would only be used for PCIe Adapters that support his level of bifurcation.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system may hang during boot up after a warm reset from the OS.</p>

<p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.</p>

<p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.42_07-17-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option for DRAM Burst Refresh Mode to provide mitigation for TRRespass and Targeted Row Refresh exploits. This option should be configured to Disabled to mitigate the TRRespass vulnerability. Setting this option to Disabled may have a minimal impact to system performance. The default setting is Enabled.</p>

<p>Added a new BIOS/Platform Configuration (RBSU) option in the Minimum Processor Idle Power Core C-State setting for C1 State. This option allows for power savings during certain workloads without the performance impacts of C6 State.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where uncorrectable memory errors are seen when running memory intensive workloads with LRDIMMs.</p>

<p>Address an issue that could cause a slight degradation of performance.</p>

<p>Resolved an issue with NVMe hot add or removal which may result in an unrecoverable I/O error reported in the Integrated Management Log (IML).</p>

<p>Addressed an issue where the UEFI Shell command GetPciRom may not display information for PCI expansion device drivers.</p>

<p>Addressed an extremely intermittent issue with AMD Epyc 1st Gen processors that would cause a critical error and system reset.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fdecd8de3b2448668fbc68e73736a3fc" version="deac96d1c675459f8f95ac0aa828e2bb" lucid_version="ql_iscsiuio_bl.sles12sp3@2.11.5.13-3(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.11.5.13-3" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product has&nbsp;been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.11.5.13-3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an&nbsp;iSCSI discovery failure with VLAN.</p>

<p>This product addresses an issue where&nbsp;an iSCSI portal is&nbsp;discovered with invalid an VLAN ID.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f509039a672245dc846e395d9ac11727" version="f478166f890b440794d978597569a26f" lucid_version="qla2xxx.driver.esxi67.zip_bl@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 3.1.46.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 3.1.36.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>Improved adapter driver handling of and recovery from the unexpected behavior described in Customer Advisory titled: &ldquo;HPE ProLiant, Synergy and Superdome Flex Host Bus Adapters (HBA) - Certain Fibre Channel HBA Firmware May Cause the Operating System to Halt and Potentially Compromise Filesystem Data Integrity&quot; at the following link:</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp;<a href="http://•	Improved adapter driver handling of and recovery from the unexpected behavior described in Customer Advisory titled: “HPE ProLiant, Synergy and Superdome Flex Host Bus Adapters (HBA) - Certain Fibre Channel HBA Firmware May Cause the Operating System to Halt and Potentially Compromise Filesystem Data Integrity&quot; at the following link: https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us  •	Attempts to recover from a management processor unresponsive as described in Customer Advisory “a00094722en_us” could lead to a secondary incomplete activity and unexpected termination of process •	Packets could be malformed when large amounts of traffic is sent to an array which supports 3PAR Persistent Checksum AND another array which is running T10-PI (also known as T10-DIF) or no block checksum technology at all">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us</a></p>

<ul>
	<li>Attempts to recover from a management processor unresponsive as described in Customer Advisory &ldquo;a00094722en_us&rdquo; could lead to a secondary incomplete activity and unexpected termination of process</li>
	<li>Packets could be malformed when large amounts of traffic is sent to an array which supports 3PAR Persistent Checksum AND another array which is running T10-PI (also known as T10-DIF) or no block checksum technology at all</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="789441ab6a994564baf44a09d88c7915" version="ce51844fbdbc4a63a62dc025ac8848f0" lucid_version="brcmfcoe.rhel8.x86_64_legacy@12.0.1342.0__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1342.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fb694776c4964491b586e98c556b93d2" version="49de3527db9a46e3b6002307ee88ab3e" lucid_version="mlnx_mft.sles12sp4.x86_64.rpm@4.16__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.15" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="288e2f6737ed4857873f59d466b41139" version="78cd9574ef4842cc8abee6eb4ef86f92" lucid_version="ixgbevf.rhel7.x86_64@4.9.3-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9.3-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 7 update 9</li>
	<li>This product enhances reliability via adding support for new mailbox communication between PF(Physical Function) and VF(Virtual Function) and remove its potential flaws that may lead to the undefined or faulty behavior</li>
	<li>This product enhances compatibility where new mailbox api implementation is alo compatible with old drivers</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 7 Update 8</li>
	<li>This product update Linux kernel documentation and Configure IRQ affinity tools</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8853841c6fb24cd98f983bbce280eeca" version="e8d24c1071c544ecbaca93c77a9bf2e4" lucid_version="lpfc.driver.esxi65.zip_rt@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.8.317.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.6.182.2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="446098f1e7d240bb85aed0cf4ebd644e" version="4878a8e954c44a2b85bbd83102b82f62" lucid_version="tg3.sles12.x86_64@3.139b-2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.139b-2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The products fixes an a race condition issue where driver will still try to access the PHY(physical layer) although it was already brought down when the tg3 timer fires</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.138b-2" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 12 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ebf7ff9c6812476d970ce7cd8ffbe7b6" version="45aafc1cf8464e5c91f0db8e008dbbf1" lucid_version="emulex.fc.fw.esxi67_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<p>&nbsp;</p>

<table border="1" cellpadding="1" cellspacing="1" dir="LTR" style="width:935px">
	<tbody>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 81E 8Gb Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 82E 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 84E 8Gb Quad Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1000E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1000E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E Quad Port 16Gb Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp; have separate components to update fibre channel and converged network adapters.&nbsp;This is a fibre channel&nbsp;update component.</p>

<p><strong>Contains:</strong></p>

<p>32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>16/32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>16 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>8 Gb HBA Standup firmware 2.10X6<br />
8 Gb standup universal boot image 12.60a4(12.6.302.0 BIOS, 12.6.284.0 UEFI)</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c48bc2a5906e4288a0300950c2ec6126" version="220b7a7f7dfd4094b276c1163775759b" lucid_version="hpe-nfc-agent-rhel@1.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.0-1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Version</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="51d4f5b1652542c6b4d9e256967fc72b" version="f7be30066fa04aa1afc15d71d9081e34" lucid_version="I41.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c33dcf4fcf5847ada8c87d0479b6cb3a" version="d9895c5f9e13456aba96169387baa5ba" lucid_version="MB1000GVYZE_MB2000GVYZF_MB3000GVYZH_ESXi@HPG4(H)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2cfba0d873b646c19a7524c98b475007" version="a5f7805991004c5dbc1fb7dab4edfb9d" lucid_version="emulex.cna.fw.win.x64_bl@2021.02.01__sc-windows-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp;have separate components to update fibre channel and converged network adapters.&nbsp; This is a converged network adapter update component.<br />
<br />
Updated CNA (XE100 series) firmware&nbsp;</p>

<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650FLB Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 20Gb 2-port 650M Adapter</td>
			<td>20Gb</td>
			<td>12.0.1277.0</td>
			<td>12.0.1336.0</td>
			<td>12.0.1269.0</td>
			<td>12.0.1171.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dc2f3874388f4d969828a39097a550e8" version="318d02b7b8ba480692b0f1fc9717412b" lucid_version="VO0480JFDGT_VO0960JFDGU_VO1920JFDGV_x64@HPD9(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ce9d04fe2b3e43e88c77633c663ce12b" version="bad1c2373fd040b486e6f165225397ef" lucid_version="hp-ams_sles12_x86-64@2.10.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.10.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed&nbsp;a small amount of memory leak as documented in the Customer Advisory, <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00053824en_us" style="color:#0563c1; text-decoration:underline">a00053824en_us</a></li>
	<li>&nbsp;NVMe drive information is now available in the CPQSE.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.10.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Enhancements added in this release:</p>

<ul>
	<li>Support for SUSE Linux Enterprise Server 12 Service Pack 5&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the Following Items:</p>

<ul style="list-style-type:square">
	<li>Added&nbsp;the warning message for users to restart hp-ams service when iLo reset more than twice. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099805en_us" style="color:#0563c1; text-decoration:underline">a00099805en_us</a>.&nbsp;&nbsp;</li>
	<li>When the server detects the physical network cable is plugged or unplugged, hp-ams will send out a trap to notify the administrator about the&nbsp;physical network status change.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="955509238bc94896999b8a9beb96f9dc" version="7385e5e17c374a9ea6a26c6231f7af53" lucid_version="esxi65-mgmt-sw-bundle-sc@2021.04.12__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.12" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Agentless Management Service</strong></p>

<ul>
	<li>Reduce&nbsp;Software Inventory cache refresh time to 15 seconds to help resolve OneView online SW update issues without reboot.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.12.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Agentless Management Service</strong></p>

<ul>
	<li>Fix PSOD exception resulting from repeated failed attempts to communicate to iLO (Gen10 AMS only)</li>
	<li>Fix false NVMe disk temperature alerts</li>
	<li>Fix missing OS, driver and software info from AHS logs</li>
	<li>Fix max and threshold temperature values for SATA disks to prevent fans from running at higher rate</li>
	<li>Fix false SATA disk status change alerts</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e7a36c6c410640b394ca5fa6b0bcd1f9" version="1db8fc89c00d46ee821089c4f52a593e" lucid_version="MegaSAS2.win2019.x64@6.714.18.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="6.714.18.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Yet to update.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ed78d2df04834204b8977e0aaa96c64a" version="321fce2f873a4dd5931ad5a6e469a6f5" lucid_version="i40eb.w2k19@1.13.104.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.13.104.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an traffic packets making cert failure seen when packets transferred to VLAN after RDMA function enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.171.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product added implementation of Advanced Link Speed functionality in Physical Function (PF) driver that are supports dynamic link speed changes.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which Blue Screen of Death （BSOD） (0x133) occurred with Remote Access Role service during shutdown.</li>
	<li>This product correct an issue which system crashed after few modifying Intel&reg; Advanced Network Services (Intel&reg; ans) Team type with tagged Virtual Local Area Network (VLAN).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c1b78da8d92c4109b1ad0059c99cc84f" version="7475a126df094b9593aff1ae7daca10b" lucid_version="MLNX_VPI_CX4_CX5_HCA_FW_package.esxi65@1.0.8__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.28.1002:</strong></p>

<p>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)<br />
825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 12.28.1002:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>Firmware for the following devices are updated to 16.29.1016:</strong></p>

<p>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)<br />
872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compared to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Steering DP hash flow groups.</li>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>PCIe Rx modifications to prevent the adapter cards from disappearing from the system.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
	<li>cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>[Beta]&nbsp;Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that prevented&nbsp;VXLAN packets with svlan/ cvlan tag from being matched.</li>
	<li>An issue that caused the&nbsp;eth_wqe_too_small counter to count&nbsp;ODP (On-Demand Paging) page faults.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>An issue that resulted in low performance after enabling the RoCE Accelerator capability. Note:&nbsp;The fix is available when all ports are set as Ethernet.&nbsp;</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.</li>
	<li>An issue that caused&nbsp;the device to go to down IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.&nbsp;</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.28.1002:</strong></p>

<ul>
	<li>An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.7" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.27.4000:</strong></p>

<p>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)<br />
825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 12.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>Firmware for the following devices are updated to 16.27.2008:</strong></p>

<p>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)<br />
872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observerd while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="001e7fbaf67f420ebcb746aae6b4aee2" version="7fddfef382994aa5a0519a1098511a53" lucid_version="VO000800JWZJP_VO001600JWZJQ_VO003200JWZJR_ESXi@HPD4__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modify Drive Vendor Identification String (VID) in Inquiry page from &ldquo;HP&rdquo; to &ldquo;HPE&rdquo;.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Increased Queue Size from 32 to 128 to be equal to the max number of chips.</li>
	<li>Refresh NM SRAM area periodically only when idle as a possible work around on NM SRAM parity error.</li>
	<li>Change the error response as 0x3 (SP_Busy) or 0x07 ( NO_SESSION_AVAILABLE) when host attempts to open another session while a session is already opened.</li>
	<li>Disable verify compare if APP_CHK=0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9f0b7493acab4ced83fdf80f7583cdfd" version="c552a078e5e7474bb80d4e4f8cd3f064" lucid_version="bnxt_roce.sles12sp4.x86_64@218.0.7.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="218.0.7.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product now supports rdma-core v29(rdma user space application)</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="216.0.88.3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product corrects an issue which RoCE bond is not getting created automatically after system reboot</li>
	<li>This product corrects an issue which errors/performance may degrades after hot plug operation is performed</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="486d4489346f4ec8a160ad4ef3c94f99" version="8a049d9b97ac414f96675adc5871debc" lucid_version="EH000900JWHPP_EH000600JWHPN_EH000300JWHPL_ESXi@HPD4(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="54856ac460a544e2985eadac24abf907" version="f5e7b0f50a7a46d880ee1b8ef58e296b" lucid_version="MM1000GEFQV_MM2000GEFRA_x64@HPG8(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="05a81ac262384916b1fa6e922a6cada6" version="2e960f0bf1534986be4152bf7be2f43b" lucid_version="MB014000GWRTN_MB012000GWRTL_MB010000GWRTK_x64@HPG2(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c1ebf0647264498cacbe8929505ef3cf" version="1761a07da5144d82b355829da0bf5c5d" lucid_version="XP0120GFJSL_XP0240GFJSN_x64@HPS4(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPS4" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPS4 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1ba8b21e9855422b82a9a544b83e660c" version="189458f390f640e7815970da71a7de27" lucid_version="ixn_bl.w2k16@4.1.199.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.199.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation libraries, ixtmsg.dll, nicco5.dll, and nicinitx.dll.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1.131.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="29456540dcc74eaf9f223e63cf50eff7" version="10d4200a0a074ef4b5dae616c10dfe98" lucid_version="MK000240GWKVK_MK000480GWJPN_MK000960GWJPP_MK00_x64@HPG5(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a rare link loss issue and adds enhancements for drive reliability.</li>
	<li>After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.</li>
	<li>The new drive bootloader code will be activated after the next drive power cycle.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (D)" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a rare link loss issue and adds enhancements for drive reliability.</li>
	<li>After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.</li>
	<li>The new drive bootloader code will be activated after the next drive power cycle.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us</a></li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="C8627" version="2befeb38cce44ea1b85d5cacfef1aa85" lucid_version="snmpagents.win64@11.1.0.0-rev1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="11.1.0.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed unusual Windows system events originating from SNMP network agents</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="11.1.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed multiple event ID 1182 issue</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="84051890e0514293b965776dfe88fd04" version="2646888ffd7e4a339ceed66cbcc3b6bb" lucid_version="brcmfcoe.sles15.x86_64_legacy@12.0.1342.0__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1342.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fbd21bfdc4ac48d1a1f00173d5e23ce2" version="231836b382694cd5891ddf6311951fb5" lucid_version="mpt2sas.sles12.x86_64.rpm@15.10.09.00-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="15.10.09.00-1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for&nbsp;SUSE Linux Enterprise Server 12 SP4</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="15.10.08.00-1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Address the Linux Spectre Variant 2 Vulnerability Issue</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2e44a81a31b2430ba5be31f73e9e365e" version="70ae14df9b4a475786397f7bafda0e5d" lucid_version="MB006000GWBXQ_MB008000GWBYL_x64@HPG8(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="62bd64385d4642c4adfd6fdae64666cb" version="0683aef5c11449afae870d205a7ef13c" lucid_version="EH0300JEDHC_EH0450JEDHD_EH0600JEDHE_x64@HPD4(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ab64ba8d4a0a499eb17eec922888ce81" version="2fa4ac2129944adba756c9356bf562a7" lucid_version="emulex.fc.fw.esxi67_bl@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This Firmware package contains following firmware versions:</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE 16Gb LPe1605 Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>16Gb</td>
			<td>12.8.352.12</td>
			<td>12.8.352.12</td>
			<td>12.8.352.10</td>
			<td>12.8.352.5</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Universal Boot Image</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE LPe1205A 8Gb Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>8Gb</td>
			<td>12.60a4</td>
			<td>2.10X6</td>
			<td>12.6.284.0</td>
			<td>12.6.302.0</td>
		</tr>
		<tr>
			<td>HPE 16Gb LPe1605 Fibre Channel Host Bus Adapter for BladeSystem c-Class</td>
			<td>16Gb</td>
			<td>12.6.275.12</td>
			<td>12.6.275.12</td>
			<td>12.6.275.7</td>
			<td>12.6.271.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="38d3787c49804ab1b404f61b3cd58354" version="23cb86b15d95410fbc5c16274dca809c" lucid_version="VO000800JWZJP_VO001600JWZJQ_VO003200JWZJR_x64@HPD4__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modify Drive Vendor Identification String (VID) in Inquiry page from &ldquo;HP&rdquo; to &ldquo;HPE&rdquo;.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Increased Queue Size from 32 to 128 to be equal to the max number of chips.</li>
	<li>Refresh NM SRAM area periodically only when idle as a possible work around on NM SRAM parity error.</li>
	<li>Change the error response as 0x3 (SP_Busy) or 0x07 ( NO_SESSION_AVAILABLE) when host attempts to open another session while a session is already opened.</li>
	<li>Disable verify compare if APP_CHK=0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d06d054af702418fa905eb8595ceb958" version="c86040f9b0934830a295239e4468dee5" lucid_version="MK000400KWDUK_VK000480KWDUE_MK000800KWDUL_VK00_x64@HPK4(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a3c9b8269658446e8b8ae9264c4873c2" version="8184e201d6984d0c84f86f55dd46122b" lucid_version="EG0300FCSPH_EG0450FCSPK_EG0600FCSPL_EG0900FCSP_x64@HPD2(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="99c23ff7c8d6427fabec401028b615d8" version="c58f209c49b844c0be5f2a2c2c407db9" lucid_version="MZPLJ1T6HBJR-000_MZPLJ3T2HBJR-000_MZPLJ6T_x64@4H3Q(B)-rev1__sc-windows-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4H3Q" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">*REMOVED* - Version 4H3Q(B) is NO LONGER AVAILABLE for download. Working version EPK74H3Q supporting full firmware version&nbsp; is now available from the following OS-specific URLs:</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">VMware: EPK74H3Q Firmware For VMware Operating Systems, https://www.hpe.com/global/swpublishing/MTX-51e52e05d02c4fdc8de04369ac</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Windows: EPK74H3Q Firmware for Windows Operating Systems, https://www.hpe.com/global/swpublishing/MTX-17f6773477584f40934ba719f2</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Linux: EPK74H3Q Firmware for Linux Operating Systems, https://www.hpe.com/global/swpublishing/MTX-956b407dbe4a42fc97c065e86a</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Version EPK74H3Q will be available soon in Service Pack for ProLiant. For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us. This x64 Smart Component provides firmware for the following drive models: MZPLJ1T6HBJR-000, MZPLJ3T2HBJR-000 and MZPLJ6T4HALA-000</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Working version EPK74H3Q resolves the following issue:</p>

<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4H3Q (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d1014161143144dea5631e9b65f9f0d4" version="4acb8f33ebca432bae23182e83d7c4a0" lucid_version="EG001800JWJNL_EG002400JWJNN_ESXi@HPD2(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="180a7c20ed0347b4a9c066f5e5cf116b" version="e7ccf3b882044005b622e0a6d281e6cf" lucid_version="VO001000KWJSE_VO002000KWJSF_VO004000KWJSH@4ICDHPK1__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4ICDHPK1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.</li>
	<li>After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5588a72e9c0d4878a499b54f0c18241c" version="a7af1b9901e64e399d5e5fdd3aebc794" lucid_version="esxi70-amsd-sw-bundle-sc@2021.04.12__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.12" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Agentless Management Service</strong></p>

<ul>
	<li>Reduce Software Inventory cache refresh time&nbsp;to 15 seconds to help resolve OneView online SW update issues without reboot.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.12.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix PSOD exception resulting from repeated failed attempts to communicate to iLO</li>
	<li>Fix false NVMe disk temperature alerts</li>
	<li>Fix missing OS, driver and software info from AHS logs</li>
	<li>Fix max and threshold temperature values for SATA disks to prevent fans from running at higher rate</li>
	<li>Fix false SATA disk status change alerts</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ff838e600d484f85bc0967ebce9789c9" version="dd3b0d928e6d4907a41be8a294bc250b" lucid_version="hp-ams_rhel8_x86_64@2.10.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.10.2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed&nbsp;a small amount of memory leak as documented in the Customer Advisory, <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00053824en_us" style="color:#0563c1; text-decoration:underline">a00053824en_us</a></li>
	<li>&nbsp;NVMe drive information is now available in the CPQSE.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.10.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the Following Items:</p>

<ul style="list-style-type:square">
	<li>Added&nbsp;the warning message for users to restart hp-ams service when iLo reset more than twice. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099805en_us" style="color:#0563c1; text-decoration:underline">a00099805en_us</a>.&nbsp;&nbsp;</li>
	<li>When the server detects the physical network cable is plugged or unplugged, hp-ams will send out a trap to notify the administrator about the&nbsp;physical network status change.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5bfad4d210f242bd90a5c8fa29d29f05" version="015f4c322a164e6494c7e3ffb7fdf9e9" lucid_version="VO001920KWVMT_VO003840KWVMU_VO007680KWVMV_x64@HPK3__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Fixed SSD weargauge report error issue.</li>
	<li>Fixed Assign FWState as TR_DONE_ERR at the correct location.</li>
	<li>Prepare proper response data for Get Message Type Supported MCTP Command.</li>
	<li>Added code to preserve current feature values cross live firmware update.</li>
	<li>Allocate 4 bytes instead of 2 bytes for parameter code.</li>
	<li>Changed the value for NLB equal to NSize -1.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue where the SSID was not programmed correctly to the drive. This may cause issues with the drive not being identified correctly in the Integrated Lights Out Utility.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="afd60bda7b524c9d827bf70af6eb6201" version="f556c312fdc24859bf6fde57b13db68f" lucid_version="HPE_Dual_8GB_MicroSD_USB.ESXi@1.3.2.215(B)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.3.2.215" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>To show corresponding&nbsp;HPE Dual 8GB&nbsp;Micron SD&nbsp;&nbsp;part number&nbsp;in Agentless Management Service version 11.2.0 or later.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.3.2.215" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>To show corresponding&nbsp;HPE Dual 8GB&nbsp;Micron SD&nbsp;&nbsp;part number&nbsp;in Agentless Management Service version 11.2.0 or later.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="438f20c90cc14939afac73df8f31d682" version="abe1e113798b42019c64b9f4507c60e8" lucid_version="Apollo_45xx.Win@2.50__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="2.50" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>&nbsp;Expander may reset during heavy SSACLI polling</li>
	<li>SATA drives may take longer to spin up, not be initially detected, and then hot add later. This can prevent system boot or affect the logical drive status.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.08 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1bc921f76f2d48759522424a4aff4914" version="a78c5b2adc924114bfb01d4b4ebe1728" lucid_version="U45.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Added a new BIOS/Platform Configuration (RBSU) option to Advanced PCIe Device Configuration called PCIe Switch MMIO Configuration.  This option addresses a virtualization issue caused by different interpretations of the PCIe specification by disabling PCIE Switch MMIO Configuration.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7943f29050984f1f850b2530e1fd78f4" version="91282beb581841a9a0428991925b27bd" lucid_version="Intel_OPA_HFI_FW_package.x64@1.9.2__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.9.2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New Features in version 1.9.2:</strong></p>

<ul>
	<li>Added hfi1_eprom <strong>v10_9_2_0_0.</strong></li>
	<li>Loader ROM <strong>HfiPcieGen3Loader_1.9.2.0.0.rom</strong> and driver EFI <strong>HfiPcieGen3_1.9.2.0.0.efi </strong>were added.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been resolved in version 1.9.2:</strong></p>

<ul>
	<li>Due to a SLES 15 kernel setting, hfi1_eprom cannot work while the HFI driver is loaded. The tool and driver are mutually exclusive.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.8.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New Features in version 1.8.1.0.0 :</strong></p>

<ul>
	<li>Added hfi1_eprom <strong>v10_8_0_0_13.</strong></li>
	<li>Loader ROM <strong>HfiPcieGen3Loader_1.8.1.0.0.rom</strong> and driver EFI <strong>HfiPcieGen3_1.8.1.0.0.efi</strong> were added.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ce7e63b5ed004965a0bc6af06ca584ef" version="0f7a7e3bb5e64b3a8635fde80674ce96" lucid_version="D6020.fwsc.linux_x64@2.74(I)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="2.74" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of Rhel 7.8&nbsp;</p>
	</li>
	<li>
	<p>Added support of Rhel 8.2&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP2</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v191364/D6020_v2.74I.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.74 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of Rhel 7.8&nbsp;</p>
	</li>
	<li>
	<p>Added support of Rhel 8.2&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP2</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v183133/D6020_P07232-008.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cdfe3840d6074900a4d11b774d3e5307" version="d022fc5463dd43e18df5b0dc7bf21e48" lucid_version="MLNX_VPI_CX4_CX5_HCA_FW_package.x64@1.0.0.9__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.9" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.28.1002:</strong></p>

<p>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)<br />
825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 12.28.1002:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><strong>Firmware for the following devices are updated to 16.29.1016:</strong></p>

<p>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)<br />
872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compared to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Steering DP hash flow groups.</li>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>PCIe Rx modifications to prevent the adapter cards from disappearing from the system.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
	<li>cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>[Beta]&nbsp;Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that prevented&nbsp;VXLAN packets with svlan/ cvlan tag from being matched.</li>
	<li>An issue that caused the&nbsp;eth_wqe_too_small counter to count&nbsp;ODP (On-Demand Paging) page faults.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>An issue that resulted in low performance after enabling the RoCE Accelerator capability. Note:&nbsp;The fix is available when all ports are set as Ethernet.&nbsp;</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.</li>
	<li>An issue that caused&nbsp;the device to go to down IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.&nbsp;</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.28.1002:</strong></p>

<ul>
	<li>An issue that caused the DCR to be destroyed before the retry option managed to work when the retry timeout is too big. In this case the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.27.4000:</strong></p>

<p>825110-B21 (HPE InfiniBand EDR/Ethernet 100Gb 1-port 840QSFP28 Adapter)<br />
825111-B21 (HPE InfiniBand EDR/Ethernet 100Gb 2-port 840QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 12.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>Firmware for the following devices are updated to 16.27.2008:</strong></p>

<p>879482-B21 (HPE InfiniBand FDR/Ethernet 40/50Gb 2-port 547FLR-QSFP Adapter)<br />
872726-B21 (HPE InfiniBand EDR/Ethernet 100Gb&nbsp;2-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observerd while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d9e21a24798447d3b9521f317ae3815c" version="cdd64a1a36074a01a96d78668a6be53d" lucid_version="MLNX_Ethernet_Only_NIC_MFT_FW_package.esxi70@1.0.1-rev1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device is&nbsp;updated to 14.29.1016:</strong></p>

<p>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</p>

<p><strong>Following New features and Changes are included in version 14.29.1016:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in version 14.29.1016:</strong></p>

<ul>
	<li>An issue that caused the sent packet to hang while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>A rare case where the the device froze&nbsp;while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance while using the VSC to trigger the send_ring_doorbells.</li>
	<li>An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.</li>
	<li>An issue that caused the fragmented IP packets to drop was fixed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device is&nbsp;updated to 14.28.1002:</strong></p>

<p>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</p>

<p><strong>Following New features and Changes are included in version 14.28.1002:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in version 14.29.1016:</strong></p>

<ul>
	<li>An issue that caused the sent packet to hang while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>A rare case where the the device froze&nbsp;while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance while using the VSC to trigger the send_ring_doorbells.</li>
	<li>An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.</li>
	<li>An issue that caused the fragmented IP packets to drop was fixed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a6c377914cad4568810f0a24fc0faa52" version="4db1b4e31bf84d5d857f1e7d26a1800d" lucid_version="MK000480GWXFF_MK000960GWXFH_MK001920GWXFK_ESXi@HPG1(C)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a271f679286141d98830336f93a8205f" version="1810fdb1a687491283b9e3fed3d58441" lucid_version="Apollo_4200_Gen10_Plus.ESXi@0.37__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="0.37" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="288dbea3acd4439082f94ee3a892bf62" version="783ff59130864967a7428fb21e6714e5" lucid_version="VO001000KWJSE_VO002000KWJSF_VO004000KWJSH_VT00_x64@4ICDHPK1__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="4ICDHPK1" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware corrects the potential for a drive to become disabled and nonfunctional during certain conditions or workloads.</li>
	<li>After the drive is upgraded to firmware version HPK1, it cannot be downgraded to firmware version HPK0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7163f5a35db04c1899f77a9e771fd83e" version="9fbdcbe24455465ea956fcb0bf28022a" lucid_version="EG000300JWFVB_x64@HPD2(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (E)" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eaadba373a2b4b7ab82c00e6e1f55628" version="ea40446a60ef49ce9c26ee757ad061b5" lucid_version="MB014000GWUDA_ESXi@HPG2(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d6816ab14fc34e169d27b5a4d2e7e7a1" version="894f7e0469fc41eab85e1b46dab97fa4" lucid_version="igbn.vmware70@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which handling duplex value passed of ESXi command.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.05.29" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5b139cd72d0b4c89818f276c3a1dce8c" version="834a4df7aca24c9faaa9c77ab455c9b3" lucid_version="MZXL5800HBHQ-000_MZXL51T6HBJR-000_MZXL53T2_x64@3H5Q(B)-rev1__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="3H5Q" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">*REMOVED* - Version 3H5Q(B) is NO LONGER AVAILABLE for download. Working version MPK73H5Q supporting full firmware version is now available from the following OS-specific URLs:</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">VMware: MPK73H5Q Firmware For VMware Operating Systems, https://www.hpe.com/global/swpublishing/MTX-bc5a85e2da894acc87edff7b07</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Windows: MPK73H5Q Firmware for Windows Operating Systems, https://www.hpe.com/global/swpublishing/MTX-eb2b1b0ee298477fb52d02948f</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Linux: MPK73H5Q Firmware for Linux Operating Systems, https://www.hpe.com/global/swpublishing/MTX-c2d518c8671942018d4084aa37</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Version MPK73H5Q will be available soon in Service Pack for ProLiant. For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us. This Smart Component provides firmware for the following drive models: MZXL5800HBHQ-000, MZXL51T6HBJR-000, MZXL53T2HBLS-000, MZXL56T4HALA-000, MZXL512THALA-000, MZXL5960HBHQ-000, MZXL51T9HBJR-000, MZXL53T8HBLS-000, MZXL57T6HALA-000 and MZXL515THALA-000</p>

<p style="margin-left:0px; margin-right:0px; text-align:left">Working version MPK73H5Q resolves the following issue:</p>

<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3H5Q (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting .</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f4e486fae98c4ecea1e8d2f80f412bb9" version="bf80ddf91812427facda6e8e5dfdcc45" lucid_version="tg3.rhel7.x86_64@3.139b-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.139b-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7 update 9</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The products fixes an a race condition issue where driver will still try to access the PHY(physical layer) although it was already brought down when the tg3 timer fires</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.138b-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7 Update 8.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="86fd494457ed46feb0f879467158193c" version="29f14f28e3cd49e48ad5f77fa73883c0" lucid_version="VK0240GEPQN_VK0480GEPQP_VK0960GEPQQ_x64@HPG1(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="05ff557836a74529980644359cf7e2c2" version="8c4ac2e12a1c44e1887f4676d89bbac0" lucid_version="i36.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled (TXT is disabled by default). This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="19810cc433a442df903276a4b0c34598" version="3269916fcbf34d988e11d77cbd9f82c6" lucid_version="mellanox_winof2.w2k19@2.60.23957.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.60.23957.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>Mellanox MCX623105AS-VDAT Ethernet 200Gb 1-port QSFP56 Adapter for HPE</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses a Windows Stop Error (BSOD) seen when running Mellanox NdStat Utility (mlx5cmd -ndstat) while ND connections was closing.</li>
	<li>This product corrects driver loading failures seen due to incorrect INF file.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40.22511.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">This product now supports the following network adapters:</p>

<ul style="list-style-type:square">
	<li>HPE Ethernet 100Gb 2-port QSFP56 MCX623106AS-CDAT Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="760adb908c054b5b910c54e6c4a5f9e4" version="0a720e62376e46e3be17948808b902ba" lucid_version="ixgbe.rhel8@5.9.4-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.9.4-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 8 update 2 and Red Hat Enterprise Linux 8 update 3</li>
	<li>This product enhances reliability via adding support for new mailbox communication between PF(Physical Function) and VF(Virtual Function) and remove its potential flaws that may lead to the undefined or faulty behavior</li>
	<li>This product enhances compatibility where new mailbox api implementation is alo compatible with old drivers</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.7.1-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product update Linux kernel documentation and Configure IRQ affinity tools</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5e40c73cb84f441f80acf9f709720859" version="dd821dd7504540a78e4228ce17f5730d" lucid_version="pwrPICflash.DL580Gen8.win.x64@4.1(F)__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver.&nbsp;4.1 (F) adds support to perform the Online ROM Flash with Microsoft Windows Server 2016 by using Smart Update Manager.&nbsp; It is functionally equivalent to ver. 4.1.&nbsp; It is not necessary to upgrade with Revision&nbsp;(F) if a previous component revision was used to upgrade the firmware to ver.4.1.</p>

<p><strong><strong>Firmware Dependencies:</strong></strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This is the initial version of the firmware.</p>

<p><strong><strong>Known Issues:</strong></strong></p>

<p>The smart component prompts for reboot unnecessarily when the installation procedure is completed. Reboot is not required after installation for updates to take effect and hardware stability to be maintained.<br />
&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver.&nbsp;4.1 (E) contains an update to resolve information disclosure vulnerability issue ref: CVE-2017-8992.&nbsp; It is functionally equivalent to ver. 4.1.&nbsp; It is not necessary to upgrade with Revision&nbsp;(E) if a previous component revision was used to upgrade the firmware to ver.4.1.</p>

<p><strong><strong>Firmware Dependencies:</strong></strong></p>

<p>None</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>This is the initial version of the firmware.</p>

<p><strong><strong>Known Issues:</strong></strong></p>

<p>The smart component prompts for reboot unnecessarily when the installation procedure is completed. Reboot is not required after installation for updates to take effect and hardware stability to be maintained.<br />
&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b9a8e50fea15459f9f236f2538fb4a07" version="6796559031774402b1116055f89cc4a0" lucid_version="b57.win64@214.0.0.6__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="214.0.0.6" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product correct an issue which fixes Windows driver causes NMI/RSOD during OS shutdown.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="214.0.0.4" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which system crashed while enable/disable cycle when running along with certain video driver.</li>
	<li>This product correct an issue which the Gets statistics from a network adapter command (Get-NetAdapterStatistics) does not work with WS2019.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="21671a6ff3c64fa1be71c992a0903728" version="bafcd3494cbc44a3bf3b9aaa241ffacf" lucid_version="elxiscsi.vmware65@2020.09.14__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.09.14" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.03.09" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue ESXi lib naming convention in iscsi driver packages caused payload conflict for ESXi 6.5.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="182450d5bced417a85db3271254808a7" version="63d5ef924fbb49bdb10d152007bf5f2d" lucid_version="MM1000JEFRB_MM2000JEFRC_x64@HPD8(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ada4d6aedd4b4604b810f81be7da5b19" version="8ea8b5ddbbed494483cd9c3862f9b640" lucid_version="EH0300JDYTH_EH0450JDYTK_EH0600JDYTL_x64@HPD6(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="207e342b08574d3c81d084ed48dc2f05" version="a582314c279949fe92a9b8ea5c502586" lucid_version="U19.vmware@2.80_10-16-2020(B)__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.80_10-16-2020(B) contains updates to the component packaging and is functionally equivalent to ver. 2.80_10-16-2020. It is not necessary to upgrade with Revision (B) if a previous component revision was used to upgrade the firmware to 2.80_10-16-2020.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.80_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="38f8dc6c0e3046598e2c4afc7a94419e" version="0e42df4e314642128a17d2e2c13871ef" lucid_version="mlnx_en_roce.sles12sp5.x86_64.rpm@4.9(A)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.9" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a436ff0616cd485d9ad02a8eddc12852" version="2c7cee0009754224a1897c3b71702a7f" lucid_version="MB1000GVYZE_MB2000GVYZF_MB3000GVYZH_x64@HPG4(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c20869f6e72044ccb4d2b142b029a1ef" version="8021b032a54b489d88e228bce812d8b2" lucid_version="MB001000GWJAN_MB002000GWFWA_MB004000GWFWB_x64@HPG1(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fcc57b2588b04f54a01cb383a7a5a458" version="f4b470527ea348c0bd7e37c8a1b68a96" lucid_version="MB001000GWCBC_MB002000GWCBD_ESXi@HPG6(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5c9d950d613945119a93065a8b8651f2" version="279f3616543447c7b02bbe9752409ce9" lucid_version="MO0200JEFNV_MO0400JEFPA_MO0800JEFPB_MO1600JEFP_x64@HPD3(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="188f54d508794fafbb14f21866a0ffb5" version="40ac72e3b3934c77a889dde8726afe6d" lucid_version="MB004000JWKGU_x64@HPD1(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6114e7f77ac240e69cf280b518ec5e27" version="b04ce171107a45b2975a9fc4d4a243e7" lucid_version="MB001000GWFWK_MB002000GWFWL_x64@HPG6(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3f367d314e5844f2951b656b04957c6e" version="c7c98ad976964ee49cfa97beac60940c" lucid_version="net-mst.vmware70@2020.11.11__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.11.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>NMST version&nbsp;4.14.3.3</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.05.20 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>No Enhancement as it is Initial version.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="261bf666a3f24e9b933c66b3d8c0b26e" version="3a67bb1ce3054cfc875e8346996b113e" lucid_version="Sheldon_Gen10_EXP_Esxi@2.00(C)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="2.00" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware vSphere 6.7 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.00 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Improved integration with Smart Update Manager.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="225a3736a3d645ae82a85050bf27993e" version="a6e673e4121147328a8b660f7e4d38f7" lucid_version="VK000240GWSRQ_VK000480GWSRR_VK000960GWSRT_x64@HPG4(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>PrefetchClear logic error on Write CMD.</li>
	<li>ICRC Data Integrity improvement.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c22851f0ee734a8da996d363b5084433" version="f46a0509d5db4fdb8ac9d718545604ca" lucid_version="U14.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8384f9a8878649da8d668b07fb30c48e" version="c7214d5cb19c4e6fb1becffff91bccd0" lucid_version="iLO5_FW_WIN.X64@2.42__sc-windows-fw-ilo_en"/>
      <revision_history>
        <revision>
          <version value="2.42" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>- Added Server Identity (iLO IDevID, iLO LDevID, System IDevID, System IAK and Platform certificates)&nbsp;<br />
&nbsp; capability to uniquely identify a server across networks that is cryptographically verifiable<br />
- EAP-TLS based authentication for onboarding into an 802.1X access-controlled network<br />
- Enabled support for Intel VROC</p>

<ul>
	<li>Device discovery and inventory of VROC SATA Controller and drives attached to it</li>
	<li>Firmware inventory of Intel VROC(VMD NVMe RAID) and VROC SATA Controller</li>
</ul>

<p>- Extend size for firmware versions supported to 48 bytes<br />
- Liquid Cooling support for Apollo systems<br />
- Server Platform Services Descriptor verification and recovery<br />
- Enabled Discovery, Inventory and Thermal support for Pensando Cloud Adapters</p>

<ul>
	<li>P41849-B21: Pensando DSP DSC-25 Cld-SP 10/25Gb Card</li>
	<li>P41852-B21: Pensando DSP DSC-100 Cld-SP 100Gb Card</li>
</ul>

<p>- For Synergy, restricted the capability to change below settings.</p>

<p>&nbsp; Note : Changes to these settings can affect communication between One-view and iLO</p>

<ul>
	<li>iLO Web service&nbsp;</li>
	<li>iLO Web service Non-SSL Port</li>
	<li>Web server SSL Port</li>
	<li>iLO RIBCL Interface</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>- Corrected Product Name listed under Device Inventory as &quot;NVIDIA Quadro M3000SE&quot;, that was wrongly listed as &quot;Synergy 75W MXM Mezzanine&quot; with iLO firmware v2.16 and higher<br />
- iLO stops monitoring the second Pensando card after the first one fails with a PCIe error<br />
&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.41" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support to import large sized LDAP CA certificate</li>
	<li>Support enablement for latest Intel Persistence Memory</li>
	<li>iLO GUI to display the Host Operating System Version</li>
	<li>Display platform Resiliency and Serviceability (RAS) policy in iLO GUI</li>
	<li>Added standard redfish schema support for Computer System &ndash; Reset, Graceful restart actions&nbsp;</li>
	<li>Real CPU temperature is reported in addition to normalized temperature (this feature requires ROM 2.40 version)</li>
	<li>Support for Active Health System logging by RDE ( Redfish Device Enablement ) enabled devices</li>
	<li>Support alerting feature for RDE ( Redfish Device Enablement ) enabled devices&nbsp;</li>
	<li>Ability to control LED for locating direct attached SATA drives</li>
	<li>Ability to reset power for direct attached SATA drives&nbsp;</li>
	<li>Added write protect setting feature for Liquid cooled Delta/Redstone GPU cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>iLO 5 reporting incorrect Power Supply count with iLO 5 v2.10</li>
	<li>Continuous logging to IML of a CHIF Error running ESXi with iLO 5 v1.46</li>
	<li>Random messages &quot;smad[]: No response from iLO for Hello&quot; seen in certain Operating Systems&nbsp;</li>
	<li>Incorrect MAC address shown in iLO for Synergy 4820C network adapter</li>
	<li>InfiniBand card not syncing with Oneview in iLO 5 v2.30</li>
	<li>Copy/paste may not work for more than 255 characters to VSP terminal in Linux platforms&nbsp;</li>
	<li>547FLR / 1100Q NIC may reset to default mode after flashing from 1.48 to 2.xx</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3792f94db020466a8427ae92f8d0ad7e" version="8613ef466b6b4da59e365606398b5ebd" lucid_version="emulex.cna.fw.win.x64_rt@2021.02.01__sc-windows-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp;have separate components to update fibre channel and converged network adapters.&nbsp; This is a converged network adapter update component.</p>

<p dir="LTR">Updated CNA (XE100 series) firmware</p>

<table border="1" cellpadding="1" cellspacing="1" style="width:800px">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Firmware</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 10Gb 2-port 556FLR-T Adapter</td>
			<td>10Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</td>
			<td>10Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE CN1200E Dual Port Converged Network Adapter</td>
			<td>20Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;CN1200E-T Dual Port Adapter</td>
			<td>20Gb</td>
			<td>12.0.1336.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp;have separate components to update fibre channel and converged network adapters.&nbsp; This is a converged network adapter update component.<br />
<br />
Updated CNA (XE100 series) firmware&nbsp;</p>

<p>Contains:<br />
CNA (XE100 series) firmware 12.0.1280.5</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<p>UEFI:</p>

<ul>
	<li>HPE FlexFabric 20Gb 2-port 650FLB Adapter and HPE FlexFabric 20Gb 2-port 650M Adapter&nbsp;does not complete&nbsp;to create boot source on 2nd port</li>
</ul>

<p>Firmware:</p>

<ul>
	<li>Light Emiiting Diode(LED) is in&nbsp;invalid state when disable the port under Unified Extensible Firmware Interface (UEFI)</li>
	<li>Duplicate Entries found in firmware report under NIC details for few adaptors.</li>
	<li>Full adapter name is not displayed for HPE FlexFabric 20Gb 2-port 650M Adapter&nbsp;in some Rom Based Setup Utility (RBSU).</li>
	<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
</ul>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5410a19b6b464f26bd8935266bc1120d" version="889eff9d4cd3466d8f5fbc1b1f05e4a4" lucid_version="u39.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="48fa0a59576f43e996cb7cfa8674ff57" version="2f3bb5ac015646aa967c69284bb788f8" lucid_version="U14.Vmware@2.80_10-16-2020__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px"><strong>Important Notes:</strong></p>

<p style="margin-left:0px; margin-right:0px">Ver. 2.76_10-21-2019 (B)&nbsp; contains updates to the component packaging and is functionally equivalent to ver. 2.76_10-21-2019.&nbsp; It is not necessary to upgrade with Revision B if a previous component Revision was used to upgrade the system ROM to version 2.76_10-21-2019.</p>

<p style="margin-left:0px; margin-right:0px"><strong>Firmware Dependencies:</strong></p>

<p style="margin-left:0px; margin-right:0px">None</p>

<p style="margin-left:0px; margin-right:0px"><strong>Problems Fixed:</strong></p>

<p style="margin-left:0px; margin-right:0px">This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-0151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p style="margin-left:0px; margin-right:0px"><strong>Known Issues:</strong></p>

<p style="margin-left:0px; margin-right:0px">None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0e268c49682a427da167d2f123ccafaf" version="27150f7cb70c4c5d90b833ae651b1e3c" lucid_version="MB004000JWFVK_MB006000JWFVL_ESXi@HPD3(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f74d125372264713b4a9d8ebea70260d" version="9e6484992fe24af5921c46d0834655fe" lucid_version="a42.win.x64@2.40_02-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p><p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.</p><p>Added driver and option to enable SmartRAID SW RAID support for direct attached SATA and NVMe drives.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the fan runs at a higher than expected speed after upgrading the firmware of HPE Smart Array E208i or E408i to version 3.0.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.38_10-30-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices.  This option would only be used for PCIe Adapters that support his level of bifurcation. <p>Added support to increase the maximum amount of system memory to 8TB.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the server may encounter an Uncorrectable Machine Check Exception (UMCE) with a Bank of 0x00000005 or an Uncorrectable PCI Express Error with status 0x00040000 or 0x00010000. These errors will result in either an unexpected reset of the server or the server becoming unresponsive (such as Blue Screen with Windows, Purple Screen with VMware, or Kernel Panic with Linux).  This revision of the System ROM includes the latest revision of AMD firmware which addresses this issue.  This issue is not unique to HPE servers.<p>Addressed a rare issue where the system may fail to boot after a warm reset.<p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.<p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e2ded6c100dc4bec88c153fd9c85c964" version="58bbcff8f5434dfb94e18c4a5443a13d" lucid_version="ixgbe.rhel7.x86_64@5.9.4-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.9.4-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 7 update 9</li>
	<li>This product enhances reliability via adding support for new mailbox communication between PF(Physical Function) and VF(Virtual Function) and remove its potential flaws that may lead to the undefined or faulty behavior</li>
	<li>This product enhances compatibility where new mailbox api implementation is alo compatible with old drivers</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.7.1-2" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue where the patched kernel symbol changed on PTP (Precision Time Protocol) module.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a9c6682103ab49b8854f0561c589b05c" version="33b56164c4cb40c9b2ba8fd228c89e63" lucid_version="qla2xxx.sles12.x86_64_legacy@10.02.01.00.a14-k1__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.01.00.a14-k1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 10.02.01.00.a14-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.01.00.64.12.4-k1b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated Driver for:</p>

<p>SuSE Linux Enterprise Server 12 service pack&nbsp;4 (SLES12 sp4)&nbsp;version 10.01.00.64.12.4-k1b</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="820627433dee4bc3a4a1adb64a0c3d74" version="05408484df0845c39625044662151743" lucid_version="H240ar_H240_H244br_P244br_P440ar_P440_P840.Esxi@7.00(D)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="7.00" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Improved flash engine efficiency</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.00 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added ESXi 7.0 support.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5e1877c3b3394cf696fd1e1223a16f2b" version="97394576b911487e84d30cbc17e4e4cc" lucid_version="amsd_sles12@2.4.1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.4.1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This release contains the following enhancements:</p>

<ul>
	<li>Enhance the robust communication with iLO. The enhancement has a proper process exist and OS signal handling.</li>
	<li>Enhance the SMA logging system for better recording of the communication events.</li>
	<li>The AMSD reports the Open NIC controllers SN to align with iLO for avoiding the un-sync information.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed a small amount of memory leak as outlined in the Customer Advisory,&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00053824en_us">a00053824en_us</a></li>
	<li>A customer may experience where smad may periodically report: No response from iLO for Hello.&nbsp; After losing connection with iLO, the subagent may experience&nbsp;high CPU utilization for trying the reconnection. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us</a>.&nbsp;</li>
	<li>The cpqIde service not able to start while the AMSD configuration is agent mode.</li>
	<li>Addressed&nbsp;buffer overflow issues in select&nbsp;corner cases.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.3.1" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following item:</p>

<ul>
	<li>A customer may experience smad periodically reporting:&nbsp;No response from iLO for Hello.&nbsp; After losing connection with iLO, the subagent may experience&nbsp;high CPU utilization for trying the reconnection. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us</a>.&nbsp; Customers experiencing this issue are requested to update to amsd version 2.3.1.&nbsp;&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="121d8116603e47a49293c085684f3fa1" version="e7964206ce6e4b73a4b4c924d0a87092" lucid_version="EG1800JEHMD_x64@HPD6(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="14652a1a392747089da4a4254064ac9d" version="83b15bbed45a4f5290f73da5e1d7a8b7" lucid_version="a41.fwpkg@2.44_11-13-2020__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.44_11-13-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices.  This option would only be used for PCIe Adapters that support his level of bifurcation. </p><p>Added support to increase the maximum amount of system memory to 8TB.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed a rare issue where the system may fail to boot after a warm reset.</p><p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.</p><p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.42_07-17-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option for DRAM Burst Refresh Mode to provide mitigation for TRRespass and Targeted Row Refresh exploits. This option should be configured to Disabled to mitigate the TRRespass vulnerability. Setting this option to Disabled may have a minimal impact to system performance. The default setting is Enabled.</p>

<p>Added a new BIOS/Platform Configuration (RBSU) option in the Minimum Processor Idle Power Core C-State setting for C1 State. This option allows for power savings during certain workloads without the performance impacts of C6 State.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where uncorrectable memory errors are seen when running memory intensive workloads with LRDIMMs.</p>

<p>Address an issue that could cause a slight degradation of performance.</p>

<p>Resolved an issue with NVMe hot add or removal which may result in an unrecoverable I/O error reported in the Integrated Management Log (IML).</p>

<p>Addressed an issue where the UEFI Shell command GetPciRom may not display information for PCI expansion device drivers.</p>

<p>Addressed an extremely intermittent issue with AMD Epyc 1st Gen processors that would cause a critical error and system reset.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e2d7a4e705f34372b47092c82c533260" version="8ec18abaa1ca4b348246ecf9bc8a2620" lucid_version="MB6000GEBTP_x64@HPG4(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="149ff2208f3a4a13b7c145a5ab625b8a" version="a0b2c3531e79499caa1aa7acf06abfb9" lucid_version="Tinker_FW_Win@1.0.14.1052__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.14.1052" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Support for HPE Gen10+ Boot Controllers: NS204i-p, NS204i-d, NS204i-t, NS204i-r.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.14.1047" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Firmware Smart Component release for HPE Gen10+ Boot Controller</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="72bb108f558244ddb21ec2debe092df6" version="7731e7e28e18499896b56c654e829017" lucid_version="be2iscsi_bl.rhel7@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7, Updates 8 and 9.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>These drivers have been&nbsp;updated to maintain compatibility with the latest firmware.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="33474bdb31ec42199bc00637b81a4d15" version="e9a4c3f67ba64794afa19f13e5d466c2" lucid_version="D8000.fwsc.win_x64@0111__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="0111" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>Incorrect programming of the&nbsp;PHY ERROR COUNTERS parameter caused the amber LED to be lit, resulting in a false warning. The counter condition was corrected and the amber LED now functions correctly.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v191365/D8000_v0111.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0107" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>In STD INQUIRY RESPONSE, the ErrM bit was always being set. The ErrM bit indicates that the enclosure firmware detects a mismatch in any of its package versions and the firmware version of a FRU component. The issue was due to an incorrect version of PSU firmware being included and that has been fixed.</p>
	</li>
	<li>
	<p>After installing the latest firmware on the enclosure I/O modules, the SES targets could not be discovered on the host. The virtual phy bit in SMP DISCOVER RESPONSE, which is used by the Microchip smartpqi HBA, was det for the virtual phy of the I/O module.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v183134/D8000_P20366-004.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="50dc9c8a9cbe4f0ba1dfe1509168e910" version="fe570d892b914b3bb1fdf0f5a38a610a" lucid_version="i40eb.w2k12_r2@1.13.104.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.13.104.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an traffic packets making cert failure seen when packets transferred to VLAN after RDMA function enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.171.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product added implementation of Advanced Link Speed functionality in Physical Function (PF) driver that are supports dynamic link speed changes.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which Blue Screen of Death （BSOD） (0x133) occurred with Remote Access Role service during shutdown.</li>
	<li>This product correct an issue which system crashed after few modifying Intel&reg; Advanced Network Services (Intel&reg; ans) Team type with tagged Virtual Local Area Network (VLAN).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d6810024a18142b0a4b8ec4db68a4e55" version="e7e8bbbc3c5f483ab2e24e384ee40f35" lucid_version="D3000.fwsc.linux_x64@5.04(B)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="5.04" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of Rhel 7.8&nbsp;</p>
	</li>
	<li>
	<p>Added support of Rhel 8.2&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP2</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v191363/D3000_v5.04B.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.04" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following enhancement has been added&nbsp;in this version:</strong></p>

<ul>
	<li>
	<p>Added support of Rhel 7.8&nbsp;</p>
	</li>
	<li>
	<p>Added support of Rhel 8.2&nbsp;</p>
	</li>
	<li>
	<p>Added support of SLES15 SP2</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>The Enabled-ClusterS2D command now completes successfully when executed on a SATA drive within a D3610 disk enclosure for a NonStop solution.</p>
	</li>
	<li>
	<p>The smart carrier, which is the drive case for SAS drives, now authenticates in the D3610/D3710 drive enclosure.</p>
	</li>
	<li>
	<p>Added new 7-segment error codes E0 and E1 to report issues with Fan modules A and B, respectively. These new codes only apply to the D3610/D3710 and only display when running firmware 5.04.</p>
	</li>
	<li>
	<p>If the storage enclosure processor within the I/O module fails, a hard reset (power down and then power up) is executed to ensure the processor comes back online.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p879663226/v177052/D3000_P07231-006.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d2d1d9a632e643969f5a1799b83f981a" version="5430cfb3ac8f44c48ffa8734e1e52191" lucid_version="MR000240GWFLU_MR000480GWFLV_VR000480GWFMD_MR0_ESXi@HPGE(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGE" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGE (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d9159bc289514e83950fce1ae62143a1" version="ff5401dfffe84d69b503488a6ea09d9c" lucid_version="MB6000JVYZD_MB4000JVYZC_ESXi@HPD4(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="74e7399cb8c44299934a1057e39251e9" version="79a03ada4e4b46f8bcbf206b7156757c" lucid_version="P86.Linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6a808075e9fa4bc19e7d11fd17511784" version="c874e98801324f498e5155ab5c91b5a9" lucid_version="MZXL5800HBHQ-000_MZXL51T6HBJR-000_MZXL53T_ESXi@3H5Q(B)-rev1__sc-vmware-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="3H5Q" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>*REMOVED* - Version 3H5Q(B) is NO LONGER AVAILABLE for download. Working version MPK73H5Q supporting full firmware version is now available from the following OS-specific URLs:</p>

<p>VMware: MPK73H5Q Firmware For VMware Operating Systems, https://www.hpe.com/global/swpublishing/MTX-bc5a85e2da894acc87edff7b07</p>

<p>Windows: MPK73H5Q Firmware for Windows Operating Systems, https://www.hpe.com/global/swpublishing/MTX-eb2b1b0ee298477fb52d02948f</p>

<p>Linux: MPK73H5Q Firmware for Linux Operating Systems, https://www.hpe.com/global/swpublishing/MTX-c2d518c8671942018d4084aa37</p>

<p>Version MPK73H5Q will be available soon in Service Pack for ProLiant. For more information, refer to HPE Customer Bulletin at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us. This Smart Component provides firmware for the following drive models: MZXL5800HBHQ-000, MZXL51T6HBJR-000, MZXL53T2HBLS-000, MZXL56T4HALA-000, MZXL512THALA-000, MZXL5960HBHQ-000, MZXL51T9HBJR-000, MZXL53T8HBLS-000, MZXL57T6HALA-000 and MZXL515THALA-000</p>

<p>Working version MPK73H5Q resolves the following issue:</p>

<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3H5Q (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting .</li>
	<li>Change MQES setting to 8192.</li>
	<li>Code change to set &#39;Slot Clock Configuration bit in Link Status register.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bb888c4588ea4d4989702d85035e6fce" version="b69938d9ef3249f1ab4a0417646ebf51" lucid_version="MO001600KWZQP_MO003200KWZQQ_ESXi@HPK5-rev1__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK5" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK5" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="91032ccb9de142bdafa34467279d1727" version="3ef1fafc2936477aaea9855f5787049e" lucid_version="igbn.vmware67@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which handling duplex value passed of ESXi command.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.12.20" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where race condition during NIC adapter reset.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="67519506663b4d259181b3f43ca2db43" version="86f9d0e7891b4a37a4f6e38fd32f7de6" lucid_version="MLNX_VPI_Ethernet_Infiniband_HCA_FW_package.esxi67@1.0.5__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.5" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5000:</strong><br />
&nbsp;&nbsp; &nbsp;764282-B21<br />
&nbsp;&nbsp; &nbsp;764286-B21&nbsp;&nbsp;</p>

<p><strong>Firmware for the following devices are updated to 2.42.5056:</strong><br />
&nbsp;&nbsp; &nbsp;764283-B21<br />
&nbsp;&nbsp;&nbsp;&nbsp;764284-B21</p>

<p><strong>Firmware for the following device&nbsp;is&nbsp;updated to 2.42.5700:</strong><br />
&nbsp;&nbsp;&nbsp;&nbsp;764285-B21</p>

<p><strong>New features in firmware version 2.42.5000:</strong></p>

<ul>
	<li>Added support for the following features.
	<ul>
		<li>new TLV: CX3_GLOBAL_CONF to enable/disable timestamp on incoming packets through mlxconfig configuration.</li>
		<li>User MAC configuration.</li>
		<li>Automatically collecting mstdump before driver reset.</li>
		<li>A&nbsp;mechanism to detect DEAD_IRISC (plastic) from TPT (iron) and raise an assert.</li>
		<li>A new field is added to &quot;set port&quot; command which notifies the firmware what is the user_mtu size.</li>
	</ul>
	</li>
	<li>Improved the debug ability for command timeout cases.</li>
</ul>

<p><strong>New features and changes&nbsp;in firmware version 2.42.5700.</strong></p>

<ul>
	<li>Modified the mlx_cmd_get_mlx_link_status command return value to return &quot;Link Type = Ethernet&quot; in Ethernet adapter cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes in version 2.42.5000:</strong></p>

<ul>
	<li>PortRcvPkts counter was prevented from being cleared after&nbsp;resetting it.</li>
	<li>The system&nbsp;Timed Out on the configuration cycle of&nbsp;the Virtual Functions (VFs) when more than 10 Virtual Functions&nbsp;performed FLR and the completion Time Out&nbsp;value was configured to a range of less than&nbsp;16 msec.</li>
	<li>The server hangs and results in NMI when running&nbsp;&ldquo;mlxfwtop &ndash;d mt4103_pci_cr0&rdquo; while&nbsp;restarting the driver in parallel (from a different&nbsp;thread). In this case, the downstream&nbsp;bridge over the device reported completion&nbsp;timeout error.</li>
	<li>In flow_steering,&nbsp;BMC could not receive a ping over&nbsp;IPV6 after running bmc_reboot.</li>
	<li>While closing the&nbsp;HCA, the RX packet caused bad access to&nbsp;resources that did not exist, and consequently caused the QPCGW or the irisc to get stuck.</li>
	<li>The master SMLID&nbsp;and the LID was either 0 or&nbsp;0xFFFF when the port was neither active nor&nbsp;armed.</li>
	<li>ibdump could not capture&nbsp;all MADs packets.</li>
	<li>link did not&nbsp;go up after reboot.</li>
	<li>Fixed a rare issue that cause the PCIe&nbsp;configuration cycle that arrived during the&nbsp;time of sw_reset to generate 2 completions.</li>
	<li>Network Controller Sideband Interface (NC-SI) did not&nbsp;work when adding the disable_static_steering_ini field in the ini file, due to&nbsp;memory allocation issue for this field in the&nbsp;scratchpad.</li>
</ul>

<p><strong>Fixes in version 2.42.5056:</strong></p>

<ul>
	<li>Fixed an issue that resulted in reading from invalid I/O address on handover from UEFI boot to OS boot, when a port was configured as InfiniBand on a VPI adapter device.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b57ffa2f7fe942a89e589fe3043c5ffa" version="a442fc9b8e35484eab8de0e83ad7665f" lucid_version="Gen9_EXP.win@5.08__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.08" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Gen10 plus UBM type 1/2/3 backplanes</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Smart Carrier Authentication Failure issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.21 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="C9113" version="6c968b1872524d75a306b957bc4aa2e6" lucid_version="hponcfg.w2k3_64@5.5.0.0(A)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.5.0.0" revision="A" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed an issue were HPONCFG Windows Smart Component was not installing when SW RAID configuration enabled in RBSU.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.5.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This version of utility specifically contains changes related to updating legacy HP branding and brand&nbsp;<br />
references from prior to the separation of Hewlett-Packard Company to current HPE branding and&nbsp;<br />
references. If you make use of this version existing scripts may break. You may have to update scripts<br />
to refer to new version.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This version does not contain any defect fixes.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fc0ed88941764df9b650bfbb2dbeee2a" version="ca77880e543f467fbe19c953c8fae31a" lucid_version="U20.vmware@2.80_10-16-2020__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="635ad6621b8d4c52b8b9de3325345e84" version="2c3f6375b301448fa3801f2a67a98036" lucid_version="qlogic.online.fw.win.x64_rt@2021.02.01__sc-windows-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE 81Q 8Gb PCIe Fibre Channel Host Bus Adapter &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE 82Q 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE 84Q 8Gb Quad Port&nbsp;Fibre Channel Host Bus Adapter&nbsp;</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE SN1000Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
		<tr>
			<td>HPE SN1000Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1100Q 16GB Dual Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1100Q 16GB Single Port PCIe Fibre Channel Host Bus Adapter</td>
			<td>16Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1600Q 32Gb Single Port&nbsp;Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE&nbsp;SN1600Q 32Gb Dual Port&nbsp;Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>1.75.07</td>
			<td>9.06.02</td>
			<td>7.04</td>
			<td>3.64</td>
		</tr>
		<tr>
			<td>HPE SN1610Q 32Gb Dual Port Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>02.04.07</td>
			<td>09.06.02</td>
			<td>7.11</td>
			<td>0.0</td>
		</tr>
		<tr>
			<td>HPE SN1610Q 32Gb&nbsp;Single Port Fibre Channel Host Bus Adapter</td>
			<td>32Gb</td>
			<td>02.04.07</td>
			<td>09.06.02</td>
			<td>7.11</td>
			<td>0.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for 8 Gb,&nbsp;16 Gb and 32 Gb&nbsp;products.</p>

<ul style="list-style-type:square">
	<li>8Gb&nbsp;Fibre Channel Host Bus Adapter:
	<ul>
		<li>Package 3.82.00</li>
		<li>Firmware 8.08.207</li>
		<li>UEFI 7.00</li>
		<li>BIOS 3.56</li>
	</ul>
	</li>
	<li>16Gb&nbsp;Fibre Channel Host Bus Adapter:
	<ul>
		<li>Package 6.03.00</li>
		<li>Firmware 8.08.231</li>
		<li>UEFI 7.02</li>
		<li>BIOS 3.43</li>
	</ul>
	</li>
	<li>16Gb/32Gb&nbsp;Fibre Channel Host Bus Adapter:&nbsp;
	<ul>
		<li>Package 1.74.07</li>
		<li>Firmware 9.03.00</li>
		<li>UEFI 7.02</li>
		<li>BIOS 3.64</li>
	</ul>
	</li>
	<li>32Gb&nbsp;Fibre Channel Host Bus Adapter:&nbsp;&nbsp;
	<ul>
		<li>Package 02.03.06</li>
		<li>Firmware 09.04.01</li>
		<li>UEFI 7.08</li>
		<li>BIOS 0.0</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8641d1fe608b4b84a83d535f2b785a88" version="eaf58d1de1d54779a08eb4e9297d0d50" lucid_version="igb.rhel7.x86_64@6.2.5-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="6.2.5-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now support <em>HPE Intel Online Firmware Upgrade Utility for Linux x86_64</em>, version (or later) to update firmware</li>
	<li>This product now supports Red Hat Enterprise Linux 7 update 9</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.2.3-2" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue where the patched kernel symbol changed on PTP (Precision Time Protocol) module.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f2578af2166847fd869273fa7aa2c430" version="290e630370304e4ba2dcfb4bd3fde21c" lucid_version="MB006000GWBXQ_MB008000GWBYL_ESXi@HPG8(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG8" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG8 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="da71eb7a509c42f8b6a612623341578e" version="15b4b850fdc4492d8625bb582580aa27" lucid_version="qlogic.online.fw.esxi65_bl@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for&nbsp;16 Gb&nbsp;products.</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE QMH2672 16Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for 8 Gb and 16 Gb&nbsp;products.</p>

<p>&nbsp;</p>

<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1" style="width:800px">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td style="width:50px">UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE QMH2572 8Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE QMH2672 16Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>16Gb</td>
			<td>6.03.00</td>
			<td>8.08.231</td>
			<td>7.02</td>
			<td>3.43</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>Enhancements have been made to the firmware to prevent and better recover from the unexpected behavior described in Customer Advisory titled: &ldquo;HPE ProLiant, Synergy and Superdome Flex Host Bus Adapters (HBA) - Certain Fibre Channel HBA Firmware May Cause the Operating System to Halt and Potentially Compromise Filesystem Data Integrity&quot; at the following link:</li>
</ul>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us</a></p>

<ul>
	<li>Address unexpected behavior when Fibre Channel adapters were simultaneously running traffic to an array which supports 3PAR Persistent Checksum AND another array which is running T10-PI (also known as T10-DIF) or no block checksum technology at all</li>
	<li>Fibre Channel adapter firmware versions were not showing up as expected in the AHS log.</li>
	<li>Port statistics counters would sometimes not update in the event of Loss of Signal or Loss of Sync</li>
	<li>link downs would occur during specific frame sequences used by the HPE XP8 array after array-side link loss</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="57a91e286d3e413c8468376551e64001" version="30c2e421498640cab5db812faf3e2232" lucid_version="MB001000GWFWK_MB002000GWFWL_x64@HPG6(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="30776bdc5a7a4fa2b28af4deaeba5bf4" version="6890db2e465f48a3bc95c6e0027fd610" lucid_version="brcmfcoe.sles12.x86_64_legacy@12.0.1342.0__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1342.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="31f6809eb59143388eb68360c8d0d7ac" version="33d22e9a53ce463785916d5e05a8dafc" lucid_version="EK000200GWEPD_EK000400GWEPE_EK000800GWEPF_ESXi@HPG3(F)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="db808d6aa2e24648bcc5e3f46d635b1a" version="640d4499d8c64ee79f546d439f55961d" lucid_version="hponcfg.linux.x86_64@5.6.0-0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.6.0-0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated product name to HPE Lights-Out Online Configuration Utility for Linux (AMD64/EM64T).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed an issue where HPONCFG was not able to detect openssl library when&nbsp;multiple 64-bit openssl installed.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.5.0-0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Updated the OpenSSL API calls to support Host&#39;s OpenSSL FIPS mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c6a4f7a1c0f14173802a4263b3ee7551" version="dd124bc6bd9a4e119eb4915326bf5640" lucid_version="VK000240GWTSV_VK000480GWTTA_VK000960GWTTB_x64@HPG6(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>HPG6 introduces bug fixes, reliability enhancement and modification in SMART Attributes. Once HPG6 is downloaded, the drive cannot be changed back to an earlier firmware (eg, HPG3).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ae103f89c84644ff9172375f2aa2c907" version="ae1a27ea06534fe2aac8db60eb71132d" lucid_version="LO0400KEFJQ_LO0800KEFJR_LO1600KEFJT_LO2000KEFJ_x64@HPK4(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SLES15SP1.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0621549b347544c1869a7fcad2fb7ecf" version="4c9ecaf65e7245ae8ecbe7fabc3717f5" lucid_version="MO000400JWFWN_MO000800JWFWP_MO001600JWFWQ_x64@HPD5(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="92d9bf17d9ef471e842a80e42a41ec72" version="988ae7a0263b4228aa88a91308d6d6f6" lucid_version="MB008000GWRTC_x64@HPG1(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2dc381cd01314b3ba2f24f5b5647b2a3" version="ef41b322758e4a27b4a0b506d48f9ac4" lucid_version="MB6000JVYYV_x64@HPD2(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c1a4b1e8f3024c9bbd04b1730ba98308" version="4d188211bbb448c897b71a78c7d7b53a" lucid_version="qla2xxx.driver.esxi70.zip_bl@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 4.1.22.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 4.1.9.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="C9019" version="e52301c0ca104cbb9bbb531d56bc60b3" lucid_version="cissesrv.win.x86_64@6.46.0.64(E)__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="6.46.0.64" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for Windows Server 2019 OS.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.46.0.64 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for Microsoft Windows 10</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="314bc817543f4e91a4b234b38c27ef87" version="b21dfbf954924d1fa299076689ba5b27" lucid_version="Gen10Plus_UBM1_Backplane_PIC@1.42__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.42" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial release</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2e58b72d90ee4595851925dd371b1254" version="605c8f1ac38e48f3b9763efa2cab086b" lucid_version="lpfc.rhel8.x86_64_legacy@12.8.352.11__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.275.14" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.6.275.14</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f74d68169f04405fb74a2820e48df6f5" version="b1e7c8c9edab4a7da9fc17755693a3c5" lucid_version="matrox.G200eH3.win2016.x64@9.15.1.224(C)-rev1__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="9.15.1.224" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Intel ICX platforms</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.15.1.224 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>TBD</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0514481c6d244017bb9549a474c6c48c" version="a7d0602bb7c346adb517ab49c5767a87" lucid_version="MB6000GEXXV_x64@HPG2(I)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="24bbe0adc4dc4c7385b6f5ad6aecf867" version="9bc85f4b08f741c595a3d9d8133dab70" lucid_version="MK000480GWXFF_MK000960GWXFH_MK001920GWXFK_x64@HPG1(C)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f25420df1f7142d3a5eccbf213f27251" version="f1668619537d4ff7b387fd9916b1336f" lucid_version="a47.win.x64@2.40_02-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support for AMD EPYC 7003 processors.<p>Added support for Direct Liquid Cooling solution.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.<p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>HPE ProLiant XL675d Gen10Plus CPLD version 0F<p>HPE Apollo 6500 Gen10 Plus Chassis CPLD version 0909<P><B>Problems Fixed:</B></P>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5691df43dd354d538b509faabb482ba9" version="f7a87dbcb5aa4650afc2f146ef6bda5a" lucid_version="MO0200JEFNV_MO0400JEFPA_MO0800JEFPB_MO1600JEFP_x64@HPD3(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="799e6d2dd6574724a67dc3ea392d2873" version="495fe3b67523462ea6ad0e7e7094713c" lucid_version="Gen9_EXP.Lin@5.08__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.08" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Gen10 plus UBM type 1/2/3 backplanes</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Smart Carrier Authentication Failure issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.22" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes an issue where false Smart Carrier authenication errors may happen.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7a38c76de8ff4383970907d2998b1740" version="93e6920214dc4919bd95c3a400c54ef8" lucid_version="ixn.w2k19@4.1.197.0(B)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.197.0" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated .cat file.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1.197.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d480f616863140bd906bb9e3934e35ae" version="51c863ae26a042a3bf499fe0420670f2" lucid_version="iavf.w2k16@1.12.9.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.12.9.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation library iavfmsg.dll.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.7.119.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="17b00802f88a41f591cee6102caaf9d2" version="3d2acc7394004ccda4a789d53518b2dd" lucid_version="EG001800JWJNR_EG002400JWJNT_x64@HPD5(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d65fb45f0327449eb7763d2d9cb7bf3e" version="3f8b0c0979f34c98a460fa7fac372974" lucid_version="D8000.fwsc.esxi@0111__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="0111" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>Incorrect programming of the&nbsp;PHY ERROR COUNTERS parameter caused the amber LED to be lit, resulting in a false warning. The counter condition was corrected and the amber LED now functions correctly.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v191365/D8000_v0111.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="0107 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>
	<p>In STD INQUIRY RESPONSE, the ErrM bit was always being set. The ErrM bit indicates that the enclosure firmware detects a mismatch in any of its package versions and the firmware version of a FRU component. The issue was due to an incorrect version of PSU firmware being included and that has been fixed.</p>
	</li>
	<li>
	<p>After installing the latest firmware on the enclosure I/O modules, the SES targets could not be discovered on the host. The virtual phy bit in SMP DISCOVER RESPONSE, which is used by the Microchip smartpqi HBA, was det for the virtual phy of the I/O module.</p>
	</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p480571592/v183134/D8000_P20366-004.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dee0352e8d5a4157b5757fd1a1669bb8" version="7c8ac296a0a34a4a8db7d8cb67c6e987" lucid_version="VK000240GWCFD_VK000480GWCFE_VK000960GWCFF_x64@HPG3(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="528278d2176f4aa5b24b63a8f09b5e95" version="01a85020813547fb9aed828bab315132" lucid_version="mpt2sas.rhel7.x86_64.rpm@15.10.09.00-2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="15.10.09.00-2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for Red Hat Enterprise Linux 7 Update 6</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="15.10.08.00-1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Address the Linux Spectre Variant 2 Vulnerability Issue</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="21e4b5b75bfd4055af20a7109d8d2e08" version="3966abc47825421d85bbc0c02ee6f20c" lucid_version="Apollo_45xx.ESXi@2.50(B)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="2.50" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for the ESXi OS 7.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.50 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for the ESXi OS 7.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b81956d2c370432aad5ffc0ea6fc40b3" version="2f386f4af4224f9f916c7193874cc4ca" lucid_version="PICGen10.win.x64@1.0.7(D)__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.7" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 1.0.7 (D) contains updates to the component packaging and is functionally equivalent to ver. 1.0.7. It is not necessary to upgrade with Revision (D) if a previous component revision was used to upgrade the firmware to ver. 1.0.7.This is the initial version for HPE Gen10 Plus servers.<br />
&nbsp;</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is required to enable the support. iLO5 version 1.40 or above is required to upgrade to this version.</p>

<p><strong>Enhancements/New Features:</strong></p>

<p>Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the support. This version of firmware does not include any changes for Gen10 platforms with Intel Processors or AMD EPYC 7001 Generation Processors. iLO5 version 1.40 or above is required to upgrade to this version.</p>

<p>This is the initial version for HPE Gen10 Plus servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.7(B)" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<P><B>Important Notes:</B></P>Ver. 1.0.7 (B) contains updates to the component packaging and is functionally equivalent to ver. 1.0.7.  It is not necessary to upgrade with Revision (B) if a previous component revision was used to upgrade the firmware to ver. 1.0.7.This is the initial version for HPE Gen10 Plus servers.<br>&nbsp;<P><B>Firmware Dependencies:</B></P>For HPE ProLiant DL325/DL385 Gen10 servers, ROM version 2.00 or later is required to enable the support. iLO5 version 1.40 or above is required to upgrade to this version.<P><B>Enhancements/New Features:</B></P>Added support for AMD EPYC 7002 Generation Processors on HPE ProLiant DL325/DL385 Gen10 servers. ROM version 2.00 or later is required to enable the support. This version of firmware does not include any changes for Gen10 platforms with Intel Processors or AMD EPYC 7001 Generation Processors.   iLO5 version 1.40 or above is required to upgrade to this version.<p>This is the initial version for HPE Gen10 Plus servers.<P><B>Known Issues:</B></P>None]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4cbf7b1f2fb64da880e8ed0ed8c83095" version="6a7a88e0b9754853be953b3b8bf4bc6c" lucid_version="netxtreme2.sles12.x86_64@7.14.76-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="7.14.76-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue obtain Medium Dependent Interface(MDI) and Medium Dependent Interface Crossover (MDIX) information when execution ethtool tools</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.14.70-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where the driver Precision Time Protocol (PTP) is not working due to timestamp problem.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="defe118a27e24cc9962950a6158c3e89" version="8519df5231bc487cb2e0ce94c464ab39" lucid_version="HBA_H221_Win_x64@15.10.10.00(E)__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="15.10.10.00" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Improved Integration with Smart Update Manager.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="15.10.10.00 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Improved Integration with Smart Update Manager.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c4fb9c8ca4c44e82816b0b0a69f77b80" version="929b23682d5b48c88d61c905649fd58e" lucid_version="U15.vmware@2.80_10-16-2020__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d626ca1e86a84798ad6a218e046f62c6" version="57fa825d180d4a1eb87689b06d97fbd3" lucid_version="mlnx_mft.rhel7u8.x86_64.rpm@4.16__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.15" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="17ae190412f049ff80b7f941eb9e3732" version="ae60987bc484485fa540d44eafa730ad" lucid_version="A46.Fwpkg@2.42_02-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>System Programable Logic CPLD version 34<P><B>Problems Fixed:</B></P>Addressed an issue that could cause a slight degradation of performance.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.38_11-06-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the server may encounter an Uncorrectable Machine Check Exception (UMCE) with a Bank of 0x00000005 or an Uncorrectable PCI Express Error with status 0x00040000 or 0x00010000. These errors will result in either an unexpected reset of the server or the server becoming unresponsive (such as Blue Screen with Windows, Purple Screen with VMware, or Kernel Panic with Linux).  This revision of the System ROM includes the latest revision of AMD firmware which addresses this issue.  This issue is not unique to HPE servers.<p>Addressed an issue where the chassis name was not being reported for inventory control.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="703e98acf33d484a9d2825573e86e8c0" version="ef681d3e0afd4c7f80967265d19c0471" lucid_version="U38.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d2758fac106e4fcd86a4e9b65fdf0119" version="7c9e3001602d47ada84aad1f7ba11fd2" lucid_version="HPE3PARHostExplorer_x64@3.2.1.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="3.2.1.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Following are the new enhancements added in this release:</p>

<ul>
	<li>Tokens for detecting if the host is T10 DIF capable .</li>
	<li>&nbsp;Tokens for getting the&nbsp; Host Consumed Capacity, mount points and File System allocation units&nbsp;</li>
	<li>&nbsp;Token added for checking if a server is booting from SAN</li>
	<li>Support for Windows server 2016</li>
	<li>HPE 3PAR Host Explorer Windows supports upgrade to 3.2.1.</li>
	<li>HPE 3PAR OS version compatibility check in HPE 3PAR Host Explorer</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The following are the issues fixed in HPE 3PAR Host Explorer 3.2.1 release:</p>

<ul>
	<li>IP address token can take multiple IPs of the host with comma seperated values.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.2.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Following are the new enhancements added in this release:</p>

<ul>
	<li>&nbsp;Tokens for detecting if the host is T10 DIF capable .</li>
	<li>&nbsp;Tokens for getting the&nbsp; Host Consumed Capacity, mount points and File System allocation units&nbsp;&nbsp;</li>
	<li>&nbsp;Token added for checking if a server is booting from SAN</li>
	<li>&nbsp;Support for Windows server 2016</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>The following issues are&nbsp;fixed for HPE 3PAR Host Explorer 3.2.0 release:&nbsp;</p>

<ul>
	<li>&nbsp;IP address token can take multiple IPs of the host with comma seperated values.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5c979876c84d42aba65fe31d9aa00e1f" version="db93c053ee854774828aa1aeedf8f679" lucid_version="VO1920JEUQQ_x64@HPD3(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a6840b5d0ec24ee78bf7a78ec26db476" version="ccce75171f554f2183b302975bb25606" lucid_version="MR000240GWFLU_MR000480GWFLV_VR000480GWFMD_MR00_x64@HPGE(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGE" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGE (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="696ee1f3634445c49a160d3bc3772307" version="6dc5b5e2990d48ebae2fcbf729e0601b" lucid_version="EG0600JETKA_EG0900JETKB_EG1200JETKC_x64@HPD7(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="38555f7d1f134877a75c17953659a8a3" version="334832c847f0431b9e08c491f71d87ff" lucid_version="MB002000GWFGH_MB001000GWFGF_ESXi@HPG3(G)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="G" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (F)" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="05a973be660c403e96be2ba6f872a56d" version="8ad5f719318c4ddaa9df7476d58a4be3" lucid_version="Apollo_2000.Esxi@1.52(B)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.52" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for ESXi 7.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.52 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for ESXi 7.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="260b73b77b824e60a7231a400ce24c25" version="71e482c82f79498b8444f1dbbfee2a97" lucid_version="MB004000GWWQH_MB002000GWWQF_MB001000GWWQE_x64@HPG3(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update includes a fix that prevents unrecoverable read errors in highly localized write intensive workload, and a new servo code revision that improves performance under specific vibration conditions.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fcf6b49416e1460393e2103c04483878" version="9b798a91620e450b835fa17491d00c6d" lucid_version="MB008000JWJRQ_MB006000JWJRP_x64@HPD8__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware release provides additional protections against hangs in certain corner cases, and cleans up some error handling and command behavior issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6a2763c5a8ec446e809e71991d4253f9" version="53acdfd16b834b32afb029bddf01ef03" lucid_version="ixgbe_bl.rhel8@5.9.4-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.9.4-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 8, Updates 2&nbsp;and 3.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.6.4-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="725f060c9eaa4196aa47bcf7495820ec" version="e6d966b79ec84c6a9f01d1cf8d01107b" lucid_version="mlnx_en_roce_mlx5.sles15sp2.x86_64.rpm@5.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.2:</strong></p>

<p><strong>For ConnectX-5 Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>CQE compression support for Rx multi-strides packets.</li>
		<li>Configuring QoS on a single QP or on a group of QPs.</li>
		<li>Encap/decap hardware offload of IPv4 traffic over MPLS-over-UDP. This can be used in networks with MPLS routers to achieve more efficient routing.</li>
		<li>Connection tracking rules on VFs to forward traffic from one VF to the other.</li>
		<li>Offloading sFlow sampling rules.</li>
	</ul>
	</li>
</ul>

<p><strong>For ConnectX-5 Adapters and ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>A locking mechanism to enable parallel insertion of rules into the software steering using the mlx5dv_dr API. The parallel insertion improves the insertion rate and takes place when adding Rx and Tx rules via the FDB domain.</li>
		<li>Option to match mlx5dv_dr API on Geneve tunnel using a dynamic flex parser. The option header consists of class, type, length and data. The parser should be configured using devx command, after which a rule can be created to match on parser ID and data.</li>
		<li>Geneve tunneling offload, including matching on extension header.</li>
		<li>Parallel insertion and deletion of offloaded rules using multiple&nbsp;OVS threads.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>[Beta] Modify GTP-U TEID. This support requires flex parser&nbsp;configuration.</li>
		<li>[Beta] Improved performance of OVS Connection Tracking flows by&nbsp;enabling the merge of the multi-table flow matches and actions into one joint flow.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters and above:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Transmitted packet timestamping accuracy can be improved when using a timestamp generated at the port level instead of a timestamp generated upon CQE creation. Tx port time-stamping better reflects the actual time of a packet&#39;s transmission. This feature is disabled by default. The feature can be enabled or disabled using the following command. ethtool --set-priv-flags tx_port_ts on / off.</li>
	<li>Offloading tunnel rules when the source interface is VF (in addition to uplink) in the Hypervisor.</li>
	<li>Using Mirroring Offload with Connection Tracking.</li>
	<li>ASO flow meter using the mlx5dv_dr API, which allows for monitoring the packet rate for specific flows. When a packet hits a flow that is connected to a flow meter, the rate of packets through this meter is evaluated, and the packet is marked with a color copied into one of the C registers, according to the current rate compared to the reference rate.</li>
	<li>ASO first hit using the mlx5dv_dr API, which allows for tracking rule hits by packets. When a packet hits a rule with the ASO first hit action, a flag is set indicating this event, and the original value of the flag is copied to one of the C registers.</li>
	<li>mlx5dv_dr API support for matching on a new field &quot;gtpu_first_ext_dw_0&quot;. This field enables packet filtering based on the GTP-U first extension header (first dword only). To enable parsing of tunnel GTP-U extension header, run the following command. ./cloud_fw_reset.py FLEX_PARSER_PROFILE_ENABLE=3.</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Lx Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>IPsec full offload support for extended sequence number, replay protection window and lifetime packet limit.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;All HCA&#39;s:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>New query GID API that allows for querying a single GID entry by its port and GID index, or querying for all GID tables of a specific device. This API works over ioctl instead of sysfs, which accelerates the querying process.</li>
		<li>Performing multi-host firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reload.</li>
		<li>[Alpha] Firmware live patching in the driver. Live patching updates the firmware without the need to perform firmware reset. However, it can only be applied in scenarios where the difference between the current and new firmware versions are minor, which is decided upon by the firmware itself.</li>
		<li>devlink tool for performing firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reloads the current firmware image from the flash in case no new firmware was pending. For further information, please refer to the the devlink man page.</li>
		<li>A resiliency mechanism for the driver to manually poll the command event queue (EQ) in case of a command timeout. In case the resiliency mechanism finds unhandled event queue entry (EQE) due to a lost interrupt, the driver will handle it, after which the command interface returns to a healthy state.</li>
		<li>Setting a sniffer private flag is deprecated and no longer required. In order to capture offloaded/RoCE traffic, tcpdump can now be run on the RDMA device.</li>
		<li>Added per-port reporters to devlink health to manage per-port health activities. Users can now access the devlink port reporters by specifying the port index in addition to the device devlink name through the devlink health commands API. This update was first introduced in iproute2 v5.8. As part of this feature, mlx5e Tx and Rx reporters are now redefined as devlink port reporters. For examples, please see devlink-health manpage</li>
		<li>Optimized memory consumption of memory registration in huge page systems. As an example, in a 2MB huge page system, 600 MB would be saved for 100 GB memory registration.</li>
		<li>mlx5dv API to modify the configured UDP source port for RoCE packets of a given RC/UC QP when QP is in RTS state.</li>
		<li>Accelerating Tx datapath by saving PCI bandwidth and CPU utilization. The savings are achieved by aggregating multiple packets into a single WQE. The feature is driven by xmit_more for certain traffic types, such as UDP.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.2:</strong></p>

<ul>
	<li>Clearing min_rate on all SR-IOV legacy VFs after setting min_rate to at least one of the VFs did not disable QoS min_rate.</li>
	<li>An empty /usr/src/mlnx-ofa_kernel/default is now no longer created.</li>
	<li>An issue where installing packages through a repository failed after generation of metapackages using --add-kernel-support. The failure occurred due to excessive and incorrect Obsolete headers in those metapackages.Enabled installation of mlnx-ofa_kernel package to /bin/python3 instead of / usr/bin/python3 on RHEL 8.x systems.</li>
	<li>All IPoIB offload packets were wrongly counted as rx_csum_complete. These packets are now identified as rx_csum_unnecessary packets.</li>
	<li>mlx5dv_dr_rule_destroy segmentation fault could happen in rare cases with multiple rules on the same matcher with a different number of actions. This could happen after reusing an already deleted rule memory with less actions.</li>
	<li>An issue of moving to SwitchDev mode after configuring DSCP (Differentiated Service Code Point).</li>
	<li>Global traffic class configuration did not take effect on DC QPs (Dynamically Connected Queue Pairs).</li>
	<li>ib_send_bw traffic frequently dropped to zero when RDMA CM was used, because of incorrect&nbsp;min_rnr_timer setting on the responder side. The min_rnr_timer setting is now aligned with the setting in non-RDMA CM cases.</li>
	<li>Traffic did not pass over VFs with VST QinQ feature is enabled.</li>
	<li>When traffic was sent over Geneve VLAN with Tx VLAN offload enabled and TSO (TCP Segmentation Offload)&nbsp;or Tx csum enabled, traffic could be dropped and not sent to the wire.</li>
	<li>An issue that caused the firmware to restart upon installing mlnxofed-dpdk-upstream-libs package manually.</li>
	<li>Bad utility paths in rdma-core &quot;dracut&quot; hooks on SLES systems, which used to result in the following errors when running &quot;dracut&quot; with the &quot;--add rdma&quot; option. dracut-install:
	<ul>
		<li>ERROR: installing &lsquo;/usr/libexec/mlx4-setup.sh&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/mlx4-setup.sh dracut-install: ERROR: installing &lsquo;/usr/libexec/rdma-set-sriov-vf&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/rdma-set-sriov-vf</li>
	</ul>
	</li>
	<li>Traffic class value was not updated in DCT when set via sysfs.</li>
	<li>A doorbell loss issue on AMD platforms with Secure Memory Encryption (SME).</li>
	<li>Registering memory using mlx5dv_devx_umem_reg while forking. Without this fix, applications which use fork() or similar syscalls while using a memory registered with umem_reg could hang due to incorrect physical page mapping. This fix requires setting the IBV_FORK_SAFE environment variable.</li>
	<li>When&nbsp;unbinding the device resulted in the following message being printed to the dmesg: &quot;failed to disable DC tracer&quot;</li>
	<li>Content of file /sys/class/net//statistics/ multicast might have been out of date and might have displayed values lower than the real values.</li>
	<li>ERSPAN (Encapsulated Remote SPAN) protocol was available only when turning off Tx checksum offload.</li>
	<li>A udev script issue which caused non-mellanox devices to be renamed.</li>
	<li>Missing representor statistics when using ifconfig.</li>
	<li>Fixed wrong value of skb mark of received packets on representors.</li>
	<li>An issue which caused second port representors to be named as first port representors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.1:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>The user can now set a packet pacing rate on the special queues that forward traffic from one physical port to the other.</li>
		<li>Connection Tracking (TC) offload on network interfaces that are in NIC mode, as opposed to SwitchDev mode. Note: This support is currently available for interfaces with physical functions only.</li>
		<li>Limiting SMP MADs on the wire using a Send window mechanism. This allows the user to keep track of the outstanding number of SMP MADs per-port, and allows for limiting this number to shape traffic when the pace of SMP MADs requires control.</li>
		<li>Direct Rule (DR) API support for sampling action to allow duplication and sampling of some ratio of the traffic. The API also allows to perform a set of different DR actions on the sampled traffic.</li>
	</ul>
	</li>
	<li>Enabled on-demand device memory sync to free cached memory.&nbsp;</li>
	<li>Simplified the sanity test that verified which systems must use python3 and not python2, so that when rebuilding the kernel packages using --add-kernel-support, the systems based on RHEL/CentOS 8 were detected.&nbsp;</li>
	<li>Added back rx_dct_connect counter that queries the number of received connection requests for the associated DCTs</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.1:</strong></p>

<ul>
	<li>Extended mlx5 recovery-flow delay on VF driver when PCI interface went down</li>
	<li>ibv_get_device_list returned only accessible devices.</li>
	<li>&ldquo;rpmbuild&rdquo; (that includes basic support for building RPM packages) was not installed by the install script on SLES15 SPx systems when trying to rebuild packages.</li>
	<li>AF_XDP was not functional.</li>
	<li>neohost-backend and neohost-sdk packages were not properly removed by the uninstallation procedure and might have required manual removal before re-installing or upgrading MLNX_OFED driver.</li>
	<li>During MLNX_OFED installation, warning messages related to modules iw_cxgb3 and iw_nes might have appeared in the log.</li>
	<li>Command timeouts occurred when the Hypervisor disabled the VF&#39;s PCI interface. This fix reduces the device removal time to 2 seconds.</li>
	<li>MLNX_OFED/MLNX_EN installer will no longer automatically remove the spdk package when installing the driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f3f8a4081d78499e9a2dd9c8d9fb4059" version="b38916a6d91c4bc3982115ad94bbc38b" lucid_version="nicfwpkg_intel_e810_cq2@2.24__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="2.24" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial version</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="C9506" version="71201b28c2ee415cb2442224c541abea" lucid_version="onboard_admin_fwsc.linux@4.97__sc-linux-fw_cn,en,ja"/>
      <revision_history>
        <revision>
          <version value="4.97" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Onboard Administrator 4.97&nbsp;provides support for the following enhancements:</p>

<p><strong>Hardware additions</strong></p>

<ul>
	<li>None</li>
</ul>

<p>Features<strong>: additions and changes</strong></p>

<p>&nbsp;</p>

<p><strong>General</strong></p>

<ul>
	<li>A new feature is added to SNMP to support enable/disable options for v1/v2c protocols.</li>
	<li>New SNMP traps were added for emergency brake (e-brake) activated and deactivated events.</li>
	<li>Added support for firmware update of new NIDEC fans.</li>
	<li>Enhanced PowerPIC firmware update to support firmware version 1.8.</li>
	<li>In the Onboard Administrator GUI added support for iLO HTML5 IRC console.</li>
</ul>

<p><strong>&nbsp;Security</strong></p>

<ul>
	<li>A new feature is added in SSH to support enable/disable of Key Exchange (KEX) Algorithms.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>General</strong></p>

<ul>
	<li>Addressed an issue where running concurrent UPDATE ILO cli command from different SSH sessions cause few of the commands to end in operation failure.</li>
	<li>Fixed an issue in SET SERVER DVD CONNECT cli command usage in IPv6 environment.</li>
	<li>Addressed an issue where blade&rsquo;s ProductID update in System Rom RBSU is not reflected in the Onboard Administrator.</li>
	<li>Harnessed certificate read operation from flash to minimize certificate read failures.</li>
	<li>Fixed an issue in SNMP v3 protocol where EngineTime was not reset on increment of EngineBoot count.</li>
	<li>Addressed an issue related to blade discovery failure</li>
	<li>Fixed an issue in Smart Component where it fails to establish communication with Onboard Administrator using DHE ciphers.</li>
	<li>Addressed an issue related to ECDSA ciphers enable/disable feature.</li>
	<li>Added SSH cipher list to the configuration script</li>
	<li>Fixed an issue in Onboard Administrator GUI where IPv4 DynamicDNS could not be enabled when enclosure is configured for static IP configuration.</li>
	<li>Fixed help message display issues in CLI commands SET SSL_SESSION TIMEOUT and SET SECURESH.</li>
	<li>Addressed an issue in SNMP where EngineBoot count was incremented by two for add/delete of trap receiver.</li>
	<li>Fixed Online Help (OLH) pages display issue that occur when language pack is uploaded into Onboard Administrator.</li>
</ul>

<p><strong>Security</strong></p>

<p>&nbsp;</p>

<p>The following security vulnerabilities are fixed:</p>

<ul>
	<li>Onboard Administrator&rsquo;s web server response is enhanced to include X-Content-Type-Options security header.</li>
	<li>CVE-2011-3026 - libpng: Heap buffer overflow</li>
	<li>CVE-2018-1000517 - BusyBox wget version&nbsp; contains a Buffer Overflow vulnerability</li>
	<li>CVE-2020-1971 - EDIPARTYNAME NULL pointer de-reference</li>
	<li>CVE-2020-15861 - Net-SNMP allows Escalation of Privileges</li>
	<li>CVE-2020-15862 - Net-SNMP provides the ability to run arbitrary commands as root.</li>
	<li>CVE-2019-20892 &ndash; SNMPv3 get bulk request issue<br />
	&nbsp;</li>
</ul>

<p><strong>Issues and workarounds</strong></p>

<p>&nbsp;</p>

<p><strong>Browsers</strong></p>

<ul>
	<li>OA GUI is not accessible in Chrome versions 43.0.2357.10 to 44.0.2383.The issue was caused by a &ldquo;regression&rdquo; in Chrome (or WebKit). Customers should use an alternative browser like Firefox or Internet Explorer or try a different version of Chrome.</li>
	<li>SSO-to-iLO connection from the OA using an iLO host name fails with Microsoft Internet Explorer11 on Windows 8. On a Windows 8 system with Internet Explorer 10 or Internet Explorer 11, if the OA web GUI session is loaded using a host name instead of an IP address, an attempt to open an iLO window using SSO from the OA web GUI might result in the iLO page loading in the OA web GUI window instead of the intended new window. This issue was determined to be a bug in Internet Explorer and is expected to be fixed in a future release or update for Internet Explorer. To work around this issue, either use an IP address to load the OA Web GUI, or turn off Protected Mode for the appropriate zone in Internet Explorer&rsquo;s settings. This issue occurs only on Internet Explorer browsers.</li>
</ul>

<p><strong>FIPS</strong></p>

<p style="margin-left:40px">Certificates smaller than 2048 bits in size are not compliant with FIPS requirements as enforced by the OA firmware starting with OA 4.20. When the OA running OA firmware version 4.40 or greater is operating in FIPS Mode ON/DEBUG and is configured with a 1024-bit LDAP certificate that was installed when running a previous version of OA firmware, FIPS Mode ON/DEBUG is considered to be operating in a degraded state due to the presence of the non-compliant certificate. While operating in this FIPS-Degraded Mode operational state, attempts to set FIPS Mode OFF from the OA GUI Network Access&gt;FIPS tab will fail and show the error message The selected FIPS mode is already enabled. When the non-compliant certificate is removed, the FIPS-Degraded operational status is cleared, FIPS Mode can then be successfully set to OFF from the GUI interface. Note that the OA CLI command SET FIPS MODE OFF can be successfully used to set FIPS Mode OFF even with non-compliant 1024-bit LDAP certificates installed in the OA.</p>

<p><strong>IRC</strong></p>

<p style="margin-left:40px">Unable to open .net IRC console for Gen10 Blades, Gen9 Blades also have the same issue. The Java applet and Webstart however, loads but the virtual media mounting fails. The work around is to launch the IRC through IRC Application (HPE Lights-Out Stand Alone Remote Console) which is installed on terminal client.</p>

<p><strong>EFM</strong></p>

<p style="margin-left:40px">To use EFM on Gen 10 Blades, please select options/filters &ldquo;<em>Make Bootable ISO file&rdquo; and&nbsp;</em>&ldquo;<em>Enclosure Firmware Management&rdquo;</em>&nbsp;while creating custom SPP ISO on HPE SUM 8.0.0. Please refer to HPE SUM 8.0.0 User guide for further details.</p>

<p><strong>CAC</strong></p>

<ul>
	<li>In the CAC mode SSH, Telnet and XML Reply protocols will be disabled.</li>
	<li>Linked enclosure login will not work if the linked enclosure in CAC mode.</li>
	<li>If accurate Service account details are not provided, LDAP user login with certificate will fail.</li>
	<li>It is highly recommended to establish a recovery plan before getting started with CAC.&nbsp; If something goes wrong with the OA configuration, the OA may be recovered through the serial port or Insight Display panel and USB KEY. Both methods require physical access to the OA.&nbsp; However, if an LCD PIN has been configured (and forgotten) and local accounts have been disabled or CAC has been incorrectly configured then, the only way to recover is through a serial port. The two most common situations where OA recovery is needed are when LDAP has been configured incorrectly with local accounts disabled or when CAC has been configured without certificate access.</li>
</ul>

<p><strong>Configurable SSH Port Number&nbsp;&nbsp;&nbsp;</strong></p>

<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong></p>

<p style="margin-left:40px; margin-right:0in">If a Standby OA is running firmware version less than 4.85 and it is updated to firmware version greater than or equal to 4.85 using synchronize firmware feature from Active OA, after the firmware update and reboot of the Standby OA, SSH port will not open in the configured port number. The work around is to reboot the Standby OA and SSH port will open in the configured port in next boot. This issue will not occur in the case where SSH port is configured to default port 22 in the Active OA.</p>

<p style="margin-left:40px; margin-right:0in">&nbsp;</p>

<p><strong>Smart component</strong></p>

<p>&nbsp;</p>

<p style="margin-left:40px">When OA is in FIPS ON or FIPS TOP-SECRET mode and any of the ciphers that use&nbsp;&nbsp;&nbsp;Diffie-Hellman (DH) keys are enabled, firmware upgrade or downgrade using OA Smart&nbsp;&nbsp;Component 4.96 or earlier versions may fail with following error:</p>

<p style="margin-left:40px">&nbsp;&nbsp; Error: 1013: Client cannot connect with the Onboard Administrator. Verify the target address is correct and can be accessed from your system.</p>

<p>&nbsp;</p>

<p style="margin-left:40px">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p>

<p style="margin-left:80px">FIPS ON</p>

<p style="margin-left:80px">TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA<br />
TLS_DHE_RSA_WITH_AES_128_GCM_SHA25<br />
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384<br />
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256<br />
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256</p>

<p style="margin-left:80px">&nbsp;</p>

<p style="margin-left:80px">FIPS TOP-SECRET</p>

<p style="margin-left:80px">TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</p>

<p>&nbsp;&nbsp;&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Same error may occur when OA upgrade or downgrade is performed through Smart&nbsp;&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Update Manager (SUM) resulting in the following error message in the SUM.</p>

<p>&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Component&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Package&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Deployment Status&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Log</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ----------------------------------------------------------------------------------------------------------------------------------------------------------</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cpC39063&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Online HPE BladeSystem c-Class Onboard Administrator for Windows&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Update returned an error&nbsp;&nbsp;&nbsp;&nbsp; View Log</p>

<p>&nbsp;</p>

<p style="margin-left:40px">&nbsp;&nbsp;&nbsp;When this failure occurs, the following message can be seen in the OA Smart Component&nbsp;&nbsp;log file.</p>

<p style="margin-left:40px">&nbsp;&nbsp; Error: 1013: Client cannot connect with the Onboard Administrator.</p>

<p style="margin-left:40px">Verify&nbsp;The target address is correct and can be accessed from your system.</p>

<p>&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The work-around for this problem is to disable all the ciphers that use DH&nbsp;&nbsp;key and rerun the firmware upgrade or downgrade.</p>

<p style="margin-left:40px">Disabling ciphers can be&nbsp;done using the CLI command DISABLE SSL CIPHER or through the GUI.&nbsp; The disabled ciphers can be re-enabled once the firmware upgrade or&nbsp;downgrade is completed.</p>

<p>&nbsp;</p>

<p><strong>ILO5 Firmware Update</strong></p>

<p style="text-align:justify">&nbsp;</p>

<p style="margin-left:40px; text-align:justify">&nbsp;The UPDATE ILO command is failing to update the iLO5 firmware versions 2.10 and later on OA version 4.90 and less than 4.90. This issue is caused by the introduction of new &nbsp;signature in the iLO5 firmware version 2.10</p>

<p style="margin-left:40px; text-align:justify">. The work-around is to update the OA firmware&nbsp;&nbsp;to 4.95 and then try the UPDATE ILO command. This issue will not occur with OA versions&nbsp;&nbsp;&nbsp;4.95 and later.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.96" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Onboard Administrator 4.96&nbsp;provides support for the following enhancements:</p>

<p><strong>Hardware additions</strong></p>

<ul>
	<li>None</li>
</ul>

<p>Features<strong>: additions and changes</strong></p>

<p><strong>General</strong></p>

<ul>
	<li>AlertMail feature now supports two priorities that a user can select for the AlertMail messages..</li>
	<li>Enclosure Firmware Management (EFM) feature is optimized to speed up the EFM update operation.</li>
	<li>The SSL certificate of Onboard Administrator now supports Fully Qualified Domain Name (FQDN) in <strong>Common Name (CN) field and IP address in <strong>SAN </strong>field.</strong></li>
	<li>Common Access Card (CAC) Authentication feature is enhanced to support a configurable timeout for the SSL session.</li>
</ul>

<p><strong>&nbsp;Security</strong></p>

<ul>
	<li>Onboard Administrator supports two new TLS_DHE_RSA ciphers</li>
	<li>FIPS TOP-SECRET mode ciphers are now supported in FIPS <strong>ON </strong>and <strong>OFF </strong>modes.</li>
	<li>CLI commands SHOW SSH CIPHER, ENABLE SSH CIPHER and DISABLE SSH CIPHER are added to Show, Enable and Disable SSH ciphers in FIPS ON and OFF modes.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>General</strong></p>

<ul>
	<li>Addressed an issue where SNMP queries to Onboard Administrator OIDs were not successfully completed when VLAN is configured for Blades and Interconnects.</li>
	<li>Addressed an issue in the Device and Rack Summary GUI page to eliminate the duplicate display of FLB and Mezz adapters information.</li>
	<li>Addressed an issue where Interconnects were not receiving IP address from EBIPA (or) external DHCP server.</li>
	<li>Addressed an issue where Blade Location information was not displayed correctly in SHOW SERVER STATUS ALL CLI command.</li>
	<li>Addressed an issue where DNS record update was getting delayed in DNS server when a user configured a domain name in Onboard Administrator.</li>
</ul>

<p><strong>Security</strong></p>

<ul>
	<li>None</li>
</ul>

<p><strong>Issues and workarounds</strong></p>

<p><strong>Browsers</strong></p>

<ul>
	<li>OA GUI is not accessible in Chrome versions 43.0.2357.10 to 44.0.2383.The issue was caused by a &ldquo;regression&rdquo; in Chrome (or WebKit). Customers should use an alternative browser like Firefox or Internet Explorer or try a different version of Chrome.</li>
	<li>SSO-to-iLO connection from the OA using an iLO host name fails with Microsoft Internet Explorer11 on Windows 8. On a Windows 8 system with Internet Explorer 10 or Internet Explorer 11, if the OA web GUI session is loaded using a host name instead of an IP address, an attempt to open an iLO window using SSO from the OA web GUI might result in the iLO page loading in the OA web GUI window instead of the intended new window. This issue was determined to be a bug in Internet Explorer and is expected to be fixed in a future release or update for Internet Explorer. To work around this issue, either use an IP address to load the OA Web GUI, or turn off Protected Mode for the appropriate zone in Internet Explorer&rsquo;s settings. This issue occurs only on Internet Explorer browsers.</li>
</ul>

<p><strong>FIPS</strong></p>

<p style="margin-left:40px">Certificates smaller than 2048 bits in size are not compliant with FIPS requirements as enforced by the OA firmware starting with OA 4.20. When the OA running OA firmware version 4.40 or greater is operating in FIPS Mode ON/DEBUG and is configured with a 1024-bit LDAP certificate that was installed when running a previous version of OA firmware, FIPS Mode ON/DEBUG is considered to be operating in a degraded state due to the presence of the non-compliant certificate. While operating in this FIPS-Degraded Mode operational state, attempts to set FIPS Mode OFF from the OA GUI Network Access&gt;FIPS tab will fail and show the error message The selected FIPS mode is already enabled. When the non-compliant certificate is removed, the FIPS-Degraded operational status is cleared, FIPS Mode can then be successfully set to OFF from the GUI interface. Note that the OA CLI command SET FIPS MODE OFF can be successfully used to set FIPS Mode OFF even with non-compliant 1024-bit LDAP certificates installed in the OA.</p>

<p><strong>IRC</strong></p>

<p style="margin-left:40px">Unable to open .net IRC console for Gen10 Blades, Gen9 Blades also have the same issue. The Java applet and Webstart however, loads but the virtual media mounting fails. The work around is to launch the IRC through IRC Application (HPE Lights-Out Stand Alone Remote Console) which is installed on terminal client.</p>

<p><strong>EFM</strong></p>

<p style="margin-left:40px">To use EFM on Gen 10 Blades, please select options/filters &ldquo;<em>Make Bootable ISO file&rdquo; and&nbsp;</em>&ldquo;<em>Enclosure Firmware Management&rdquo;</em>&nbsp;while creating custom SPP ISO on HPE SUM 8.0.0. Please refer to HPE SUM 8.0.0 User guide for further details.</p>

<p><strong>CAC</strong></p>

<ul>
	<li>In the CAC mode SSH, Telnet and XML Reply protocols will be disabled.</li>
	<li>Linked enclosure login will not work if the linked enclosure in CAC mode.</li>
	<li>If accurate Service account details are not provided, LDAP user login with certificate will fail.</li>
	<li>It is highly recommended to establish a recovery plan before getting started with CAC.&nbsp; If something goes wrong with the OA configuration, the OA may be recovered through the serial port or Insight Display panel and USB KEY. Both methods require physical access to the OA.&nbsp; However, if an LCD PIN has been configured (and forgotten) and local accounts have been disabled or CAC has been incorrectly configured then, the only way to recover is through a serial port. The two most common situations where OA recovery is needed are when LDAP has been configured incorrectly with local accounts disabled or when CAC has been configured without certificate access.</li>
</ul>

<p><strong>Configurable SSH Port Number&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong></p>

<p style="margin-left:0in; margin-right:0in">If a Standby OA is running firmware version less than 4.85 and it is updated to firmware version greater than or equal to 4.85 using synchronize firmware feature from Active OA, after the firmware update and reboot of the Standby OA, SSH port will not open in the configured port number. The work around is to reboot the Standby OA and SSH port will open in the configured port in next boot. This issue will not occur in the case where SSH port is configured to default port 22 in the Active OA.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3fba85b34f854c9b9b5bb51030ba5e41" version="22b60414000b47af93fb4e92dd577ef4" lucid_version="MB006000JWKGN_ESXi@HPD1(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e5dfbd8525114b8cbf5ba28d97ea5b28" version="23a1452ef14f40e5a32a246d8974f642" lucid_version="megaraid_sas.rhel7.x86_64.rpm@07.706.05.00-14__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="07.706.05.00-14" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added ProLiant features support (Megacell status, AHS, Spade, Sanitize &amp; Expander)</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="07.706.05.00-13" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added ProLiant features support (Megacell status, AHS, Spade, Sanitize &amp; Expander)</p>

<p>Added support for Red Hat Enterprise LINUX 7 Update 5</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8dad994cacb24e87b613f12e36f4c8c5" version="6f1068d84d174a2ab55d0899fd91a1d9" lucid_version="Shenandoah.win2016.x64@7.716.3.0-rev2__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="7.716.3.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.716.3.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial build</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e7f36bf9643a4e489310dc38c624a57b" version="1a5ab721a91746cda8d949d335f821dd" lucid_version="be2net_bl.sles15@12.0.1342.0-1(B)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 15 SP2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1261.0-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>These drivers have been&nbsp;updated to maintain compatibility with the latest firmware.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9e4dc8db386245f0ad4fc38aef31f547" version="e9e8048f377d4b7e92ddb287f4524f61" lucid_version="MB1000JVYZL_MB2000JVYZN_MB3000JVYZP_ESXi@HPD3(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7db6f792355b49a58fc4f82d6bbbdd99" version="f9a5a32bdc364bca9ae2cae0a4390e96" lucid_version="U32.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="52541fc006a64b3fb03d0df08b39cacd" version="dadbf3e577d54713b0aa3d97e70ef733" lucid_version="Express_Bay.win@1.78(C)__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.78" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.78 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added HPE Digital Signature</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="35899789a3884097b1355c74c1f6e789" version="1974fff0da494d00bfe2242a69c6f63f" lucid_version="Shenandoah_sas.rhel7.x86_64.rpm@07.716.02.00-rev2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="07.716.02.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="07.716.02.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial build</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b6f6f77678514383bdf949306b683bf3" version="8acb3a0ef8c64bbb9919ed6dd31cf314" lucid_version="bnxt_roce.rhel8u3@218.0.7.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="218.0.7.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px">Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4cc21db9534d4bd8a0a68234daf7c362" version="f602658f34044dda8776eb434f2c3ccb" lucid_version="mpt2sas.esxi6.5_bundle@2017.01.20(A)__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2017.01.20" revision="A" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:.1in"><strong>Change implemented in version 2017.01.20(A)</strong>:</p>

<ul>
	<li>Updated to support Service Pack for ProLiant version 2017.07.0.<br />
	<strong>Note:</strong> If component version 2017.01.20 was previously installed, then it is not necessary to upgrade to version 2017.01.20(A).</li>
</ul>

<p style="margin-left:.1in"><strong>Issues resolved in version 2017.01.20</strong>:</p>

<ul>
	<li>Fixes minor installation issue with the driver on VMware vSphere 6.5.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2017.01.20" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixes minor installation issue with the driver on VMware vSphere 6.5.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6c76dfc1e26441a48559e0f1bee2891e" version="cda01dbb84ed4022a59c5007d09ce4a7" lucid_version="D6020.fwsc.win_x64@2.74(I)__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.74" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v191364/D6020_v2.74I.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.74 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v183133/D6020_P07232-008.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d568c20f8443428c99b5421748aa1148" version="fb6d4d9ef8564204b6bcd4ce9ebe728c" lucid_version="VK0120GFDKE_VK0240GFDKF_VK0480GFDKH_VK0960GFD_ESXi@HPG1(I)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cf7cb50c769b4b00ab89aa81d9fac797" version="b5862d7933a746a2af2b6a3bd4f5b7df" lucid_version="VO000960RWUEV_VO001920RWUFA_VO003840RWUFB_ESXi@HPD3(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dd83343964ed4806840a86595ee2254d" version="d71a32b027b5495a918bf639c8bf866d" lucid_version="VO000960RWUEV_VO001920RWUFA_VO003840RWUFB_x64@HPD3(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="41769df117cd4b93b1e9b45d5d971451" version="b10ff1e5df15414d9e785c3b07636c7c" lucid_version="MK003840GWHTE_ESXi@HPG6(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9735a485aa1b43118b5c393eba2635c1" version="73bd5ea1942c4202ba0b62a3ca784997" lucid_version="VO1920JEUQQ_ESXi@HPD3(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="36bcc8676cfa4135862a614c063902e6" version="65d1b8fb7ec04441afdd3b2fa8d69d89" lucid_version="VK000960JWSSQ_VK001920JWSSR_VK003840JWSST_x64@HPD8(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (C)" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD8 that results in SSD failure at 32,768 hours of operation (i.e., 3 years, 270 days 8 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00092491en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b0ffbe90a5fd48a0bda67da833198a22" version="fc578a4d7daa458ba0a6fabd7aa33c99" lucid_version="ixs.w2k16@4.1.219.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.219.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1.199.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6c37374d90434a8f868d8552b730c508" version="aae90018c7554e92860cfe5209d9ceff" lucid_version="MegaSAS2.win2016.x64@6.714.18.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="6.714.18.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for the Apollo 4510 system</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="6.714.8.0 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Improved integration with Smart Update Manager</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ebedf697f49c4f66aeb5397b9bfdd557" version="407a82df276c4a538afaa672234f5233" lucid_version="qlgc_openiscsi.sles15sp1@2.0-873.113-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.0-873.113-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="C8718" version="2297bd211a9e45a4b4f6c9a8aba7aa43" lucid_version="hpsmh_x64.linux@7.6.6-2__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="7.6.6-2" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the following components:</p>

<ul>
	<li>&nbsp;&nbsp;&nbsp; Apache to version 2.4.41</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.6.5-3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>New OS Support</p>

<ul>
	<li>RHEL 8</li>
	<li>SLES15 SP1</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7c884a6e0000498786309bba3a9762e5" version="67bf671d39884296b587d382d441a6b6" lucid_version="mellanox_winof2.w2k16@2.60.23957.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.60.23957.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>Mellanox MCX623105AS-VDAT Ethernet 200Gb 1-port QSFP56 Adapter for HPE</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses a Windows Stop Error (BSOD) seen when running Mellanox NdStat Utility (mlx5cmd -ndstat) while ND connections was closing.</li>
	<li>This product corrects driver loading failures seen due to incorrect INF file.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40.22511.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HPE Ethernet 100Gb 2-port QSFP56 MCX623106AS-CDAT Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0f73895a23994ef3b308a27affe1d7ce" version="bcdf5e6fbf004841a66fc62ccfd32755" lucid_version="u23.vmware@2.90_11-27-2020__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.90_11-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode: 0x000000E2 (CPUID 506E3). This Intel microcode patch provide mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-8696 and CVE-2020-8698. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381. These issues are not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.88_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9).<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381 and INTEL-SA-00389. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9). These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e1ccea24a14a427dabc2aadd846feea9" version="5ef161aeb3f944638d41ffa4f78029d4" lucid_version="neches.chif.win2016.x64@4.7.1.0-rev1__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="4.7.1.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixed branding issue</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modified code to comply with de-branding requirements</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3d004333c656491289fdf09d5881fcdd" version="9cb3c5e2b3ae414b9a88736aa662a6e9" lucid_version="MK000800KWWFE_MK001600KWWFF_MK003200KWWFH_x64@HPK3(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK3 (D)" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This FW change resolves a MCTP VDM compliance issue seen by iLO version 2.30.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00111061en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="60580eadc28e490db38d80ac26f5a3b8" version="bc7bb91675cd47cf936e9297df240eb9" lucid_version="net-mst.vmware65@2020.11.11__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.11.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>NMST version&nbsp;4.12.0.105:</p>

<p>&nbsp;</p>

<p>This version adds support for the following adapters:</p>

<ul>
	<li>HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCHT Adapter&nbsp;(Part Number: P21930-B21)</li>
	<li>HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter (Part Number: P11341-B21)</li>
	<li>HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACHT Adapter (Part Number: P13188-B21)</li>
	<li>HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter (Part Number: P10112-B21)</li>
	<li>HPE Ethernet 100Gb 2-port QSFP28 MCX516A-CCHT Adapter (Part Number: P21927-B21)</li>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter (Part Number: P06154-B21)</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter (Part Number: P06250-B21)</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter (Part Number: P06251-B21)</li>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port MCX653105A-HDAT QSFP56 x16 Adapter (Part Number: P23664-B21)</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port MCX653105A-ECAT QSFP56 x16 Adapter (Part Number: P23665-B21)</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port MCX653106A-ECAT QSFP56 x16 Adapter (Part Number: P23666-B21)</li>
	<li>HPE Ethernet 100Gb 2-Port QSFP56 MCX623106AS-CDAT Adapter (Part Number: P25960-B21)</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.09.11 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>NMST version&nbsp;4.12.0.105:</p>

<p>&nbsp;</p>

<p>This version adds support for the following adapters:</p>

<ul>
	<li>HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCHT Adapter&nbsp;(Part Number: P21930-B21)</li>
	<li>HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter (Part Number: P11341-B21)</li>
	<li>HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACHT Adapter (Part Number: P13188-B21)</li>
	<li>HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter (Part Number: P10112-B21)</li>
	<li>HPE Ethernet 100Gb 2-port QSFP28 MCX516A-CCHT Adapter (Part Number: P21927-B21)</li>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter (Part Number: P06154-B21)</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter (Part Number: P06250-B21)</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter (Part Number: P06251-B21)</li>
	<li>HPE InfiniBand HDR/Ethernet 200Gb 1-port MCX653105A-HDAT QSFP56 x16 Adapter (Part Number: P23664-B21)</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 1-port MCX653105A-ECAT QSFP56 x16 Adapter (Part Number: P23665-B21)</li>
	<li>HPE InfiniBand HDR100/Ethernet 100Gb 2-port MCX653106A-ECAT QSFP56 x16 Adapter (Part Number: P23666-B21)</li>
	<li>HPE Ethernet 100Gb 2-Port QSFP56 MCX623106AS-CDAT Adapter (Part Number: P25960-B21)</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5a879ce939db4665afe30df0d13ef686" version="6fa995ffd8a64d218bac6b62009f7c50" lucid_version="Trumpkin.16gb.linux@1.04(A)__sc-linux-fw-nvdimm_en"/>
      <revision_history>
        <revision>
          <version value="1.04" revision="A" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.04" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="662f02886372406fa85fa3e657c2b940" version="854a25f6db464111a24a513a79e73674" lucid_version="U17.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000016 (CPUID 306F4) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px"><strong>Important Notes:</strong></p>

<p style="margin-left:0px; margin-right:0px">This version of the System ROM contains the latest support for Red Hat Enterprise Linux 8.x Server. Ver. 2.76_10-21-2019(C) contains updates to the firmware packaging and is functionally equivalent to ver. 2.76_10-21-2019(B) and 2.76_10-21-2019.&nbsp; It is not necessary to upgrade with Revision C if a previous component revision was used to upgrade the firmware to version 2.76_10-21-2019.</p>

<p style="margin-left:0px; margin-right:0px"><strong>Firmware Dependencies:</strong></p>

<p style="margin-left:0px; margin-right:0px">None</p>

<p style="margin-left:0px; margin-right:0px"><strong>Problems Fixed:</strong></p>

<p style="margin-left:0px; margin-right:0px">This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-0151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p style="margin-left:0px; margin-right:0px"><strong>Known Issues:</strong></p>

<p style="margin-left:0px; margin-right:0px">None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5a529d7f77484eb0a3530f4bebe91103" version="bb26172401f14b0baaa764ffcc437f2e" lucid_version="lpfc.sles12.x86_64_legacy@12.8.352.11__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.275.14" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.6.275.14</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="798a64591d87417fba658ac00f3833b5" version="656b4bd2f3054ae6bd7783e8a8f9143d" lucid_version="emulex.cna.fw.esxi70_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">Updated CNA (XE100 series) firmware</p>

<table border="1" cellpadding="1" cellspacing="1" style="width:800px">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Firmware</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 10Gb 2-port 556FLR-T Adapter</td>
			<td>10Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</td>
			<td>10Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE CN1200E Dual Port Converged Network Adapter</td>
			<td>20Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;CN1200E-T Dual Port Adapter</td>
			<td>20Gb</td>
			<td>12.0.1336.0</td>
		</tr>
	</tbody>
</table>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01 (b)" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">Updated CNA (XE100 series) firmware</p>

<p dir="LTR"><strong>Firmware</strong></p>

<p><strong>Contains:</strong></p>

<p>CNA (XE100 series) firmware 12.0.1280.5</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<p>UEFI:</p>

<ul>
	<li>HPE FlexFabric 20Gb 2-port 650FLB Adapter and HPE FlexFabric 20Gb 2-port 650M Adapter&nbsp;does not complete&nbsp;to create boot source on 2nd port</li>
</ul>

<p>Firmware:</p>

<ul>
	<li>Light Emiiting Diode(LED) is in&nbsp;invalid state when disable the port under Unified Extensible Firmware Interface (UEFI)</li>
	<li>Duplicate Entries found in firmware report under NIC details for few adaptors.</li>
	<li>Full adapter name is not displayed for HPE FlexFabric 20Gb 2-port 650M Adapter&nbsp;in some Rom Based Setup Utility (RBSU).</li>
	<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
</ul>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6f77f9ef4381482fb9f00a79ce325ab3" version="443fc8af20a24bd4b81e534438641b8a" lucid_version="a40.fwpkg@2.44_10-29-2020__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.44_10-29-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices. &nbsp;This option would only be used for PCIe Adapters that support his level of bifurcation.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where the system may hang during boot up after a warm reset from the OS.</p>

<p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.</p>

<p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.42_07-17-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added a new BIOS/Platform Configuration (RBSU) option for DRAM Burst Refresh Mode to provide mitigation for TRRespass and Targeted Row Refresh exploits. This option should be configured to Disabled to mitigate the TRRespass vulnerability. Setting this option to Disabled may have a minimal impact to system performance. The default setting is Enabled.</p>

<p>Added a new BIOS/Platform Configuration (RBSU) option in the Minimum Processor Idle Power Core C-State setting for C1 State. This option allows for power savings during certain workloads without the performance impacts of C6 State.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>Addressed an issue where uncorrectable memory errors are seen when running memory intensive workloads with LRDIMMs.</p>

<p>Address an issue that could cause a slight degradation of performance.</p>

<p>Resolved an issue with NVMe hot add or removal which may result in an unrecoverable I/O error reported in the Integrated Management Log (IML).</p>

<p>Addressed an issue where the UEFI Shell command GetPciRom may not display information for PCI expansion device drivers.</p>

<p>Addressed an extremely intermittent issue with AMD Epyc 1st Gen processors that would cause a critical error and system reset.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="116d422873c94edd9b2d0af192be21c4" version="adaac236f1bf48fc85c244c42b2fede0" lucid_version="MK000400KWDUK_VK000480KWDUE_MK000800KWDUL_VK0_ESXi@HPK4(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="96fe9c5a9b9741d5bcf4ae73623359e0" version="1a32d84d0b52452dae3dbaacd817b8f3" lucid_version="FWPKG-P31246-B21@16.29.1016__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="16.29.1016" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<ul>
</ul>

<ul>
	<li>Ethernet wqe_too_small Mode<strong>: </strong>New counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>PCIe Rx modifications to prevent the adapter cards from disappearing from the system.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>Steering DP hash flow groups.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
	<li>The&nbsp;cq_overrun counter: The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>Enabled the capability to allow Virtual Functions to send Pause Frames packets. (Beta)</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>2 new Mini CQE formats:
	<ul>
		<li>Responder Mini CQE With Flow Tag Layout.</li>
		<li>Responder Mini CQE With l3_l4_info Layout.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 16.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8e3928e62813480eab785be8f1d93fd8" version="1ad673c88f804f46832bacf6a5a76b71" lucid_version="MB2000JFDSL_MB4000JFDSN_ESXi@HPD4(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7a60cc43d9b440378249c6f65bfb67c0" version="47f9676217f04501bf174a4063882427" lucid_version="u23.win.x64@2.90_11-27-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.90_11-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode: 0x000000E2 (CPUID 506E3). This Intel microcode patch provide mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-8696 and CVE-2020-8698. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381. These issues are not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.88_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9).<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381 and INTEL-SA-00389. The Intel microcode patches included in this release are versions 0x000000DC (CPUID 506E3) and 0x0000000DE (CPUID 906E9). These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="10608c086312418089d4590d5f0549ab" version="f5161b20738247278904ef7d39a0e505" lucid_version="U18.Linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="07f321e61ae446eba28c1b93476d5170" version="96d9d87d2a094439a55f380333877c4c" lucid_version="EG1800JFHMH_x64@HPD7(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d905350ec9f94f94adf8077625981965" version="307df1bd14324e279f4fd67aee3dbad7" lucid_version="MB1000GVYZE_MB2000GVYZF_MB3000GVYZH_x64@HPG4(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="df6ba3c2e569412ab3999b9575ddb1d8" version="45f37b0ce267449e8d1f48fa116d88e7" lucid_version="MB004000GWWQH_MB002000GWWQF_MB001000GWWQE_ESXi@HPG3(B)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update includes a fix that prevents unrecoverable read errors in highly localized write intensive workload, and a new servo code revision that improves performance under specific vibration conditions.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="496a47bbdbd9415dbba6770e6ba0409b" version="ff00b14c2dbc426f89fb2c5b34207165" lucid_version="VS000480KWDUP_VS000960KWDUQ_MS000400KWDUR_ESXi@HPK4(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f5b93810cc2347bb802707c26e414376" version="0996077fc8944fe5b1740c8983cfacfa" lucid_version="FWPKG-P10180-B21@22.29.1016__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="22.29.1016" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New Features and Changes in Version 22.29.1016:</strong></p>

<ul>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Optimized vDPA performance for PPS in scalability of up to 127 devices per port.</li>
	<li>When using a Multi-Host device, the firmware can now discover who is the external SmartNIC host (the Embedded CPU PF (ECPF) ) with the highest index that is responsible for performing offload activities to the adapter card</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Eye-Opening: supported only when using NRZ signal. (Beta)</li>
	<li>Option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order. To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command and set DPP relevant attributes.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>Error statistics and reporting for vDPA.</li>
	<li>IPv6 TSO offload.&nbsp;</li>
</ul>

<p>&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 22.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR</li>
	<li>&quot;iperf3&quot; and&nbsp;&quot;iperf3 -l 512&quot;&nbsp; issue fixed&nbsp;from having traffic for virtio hardware offload solution .</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="96868d9680c84d50b81011a5d4811094" version="b78206ee68034a2fa934cf6d2af09b90" lucid_version="MB2000JFDSL_MB4000JFDSN_x64@HPD4(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7cf8ba0f8b844dfea7c2c8e00f2f739c" version="3f8e9beb42b04e1e9d4e264a15b1a354" lucid_version="lpfc.rhel7.x86_64@12.8.352.11__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.275.14" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.6.275.14</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a57e8b5260a8406f910d3b1039eaf2da" version="852d6e24b56d47a0ab7a3e05b8d89c8c" lucid_version="Apollo_4200_Gen10.Esxi@1.79(B)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.79" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added ESXi 7.0 support.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.79 (A)" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added ESXi 7.0 support.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9017d5d393b24dab905e04b38c0d82f3" version="e176eabb9c134c88ae1e0d1f591d5735" lucid_version="be2iscsi_bl.w2k16@12.0.1171.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1171.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="91a15c09dbd5425fbdb19fbefcf76977" version="fc189eb7b32a49e485a32e6a9194d91f" lucid_version="hpessacli.vmware7x.sc@2021.04.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Adding support&nbsp;to the HPE&nbsp;SR Gen10 Plus&nbsp;Controllers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f8be51b7e24840dda7b3bf9d2b21fe22" version="bdc7ccf8a9c6404e91d0116af31ef84d" lucid_version="MB6000JEQUV_MB8000JEQVA_x64@HPDB(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDB (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1e813f94062740e78e298970d25a3203" version="058d8b512c4e4243a6a2850b0e861ad7" lucid_version="be2iscsi.sles12.x86_64@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 12 Service Pack 5</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e9b531c475a54ce6b287402b5c425933" version="bfa6197aff884133a476aeffee4d9c6f" lucid_version="DL20ML30Gen10SPS.Linux@05.01.04.208__sc-linux-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="05.01.04.208" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="05.01.04.113" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This image contains the latest Intel Server Platform Services (SPS) Firmware which contains mitigations for a variety of security vulnerabilities. The following vulnerabilities have been addressed in this SPS release: CVE-2020-0545 and CVE-2020-0586. These issues are not unique to HPE Servers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="18101e2f386d4a08b577a4dbb3f10bb2" version="391f0c310c924657a228daaf899c4102" lucid_version="ilo3ci.win.x64@4.1.0.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.0.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Corrected a potential Windows bugcheck 0x50 (PAGE_FAULT_IN_NONPAGED_AREA) that could occur if Windows restarts the driver without unloading it.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.0.0.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Aligned system and operating system support with the production Service Pack for ProLiant.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="091f1e01734d4924a66d971602e115bc" version="3ea923d652164fa5a30668de3dbc85f5" lucid_version="Gen10Plus_UBM4_Backplane_PIC@1.20__sc-windows-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.20" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial release</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fde211973c7e4009ac1207f980953529" version="979326ec59914e4aa9b823e9eeb1fd33" lucid_version="VK000480GWTHA_VK000960GWTHB_VK001920GWTHC_x64@HPG2__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This maintenance FW release addresses a rare corner case COMRESET issue at warm boot, and to address an early EOL behavior under certain use cases.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="be8e1065c14f4a6883e7804dae8c691e" version="747eef619d2542c8b3387153b4270db5" lucid_version="a43.linux@2.40_02-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p><p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.</p><p>Added driver and option to enable SmartRAID SW RAID support for direct attached SATA and NVMe drives.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the fan runs at a higher than expected speed after upgrading the firmware of HPE Smart Array E208i or E408i to version 3.0.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.38_10-30-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) for dual bifurcation (quadfurcation) of PCIe Adapters to the Advanced PCIe Configuration Options. This option will allow a x16 PCIe device to be bifurcated into four x4 devices.  This option would only be used for PCIe Adapters that support his level of bifurcation. <p>Added support to increase the maximum amount of system memory to 8TB.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addressed an issue where the server may encounter an Uncorrectable Machine Check Exception (UMCE) with a Bank of 0x00000005 or an Uncorrectable PCI Express Error with status 0x00040000 or 0x00010000. These errors will result in either an unexpected reset of the server or the server becoming unresponsive (such as Blue Screen with Windows, Purple Screen with VMware, or Kernel Panic with Linux).  This revision of the System ROM includes the latest revision of AMD firmware which addresses this issue.  This issue is not unique to HPE servers.<p>Addressed a rare issue where the system may fail to boot after a warm reset.<p>Addressed an issue where the Advanced Options for Secure Boot failed to export all keys.<p>Addressed an issue where One-Button Secure Erase was not completed when SmartRAID SW RAID support is enabled.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="45e734b674094fd09fe52836988b3440" version="af8ed8c436a9407b83b20b9744f055d5" lucid_version="nvm.win.x64@3.0.2.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="3.0.2.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>These Non-Volatile Memory&nbsp;drivers enable support for Persistent Memory technology on select HPE Servers running Microsoft Windows Server 2012 R2 and 2016.</p>

<ul>
	<li>Added support for Microsoft virtual NVDIMMs (aka vNVDIMMs) presented by Hyper-V Server 2019, on WS2012R2 and WS2016 guests.</li>
	<li>Added support for HPE Persistent Memory devices (featuring Intel Optane DC Persistent Memory), on WS2012R2 and WS2016.</li>
	<li>Added support for HPE 16GB NVDIMM devices, on WS2012R2.</li>
	<li>Changed block sector size from 512B to 4096B. Old data won&#39;t be accessible and must be backed up first if it needs to be preserved.</li>
</ul>

<p>For more information about Persistent Memory technology offered on HPE Servers, please consult the following links:</p>

<ul>
	<li><a href="https://www.hpe.com/us/en/servers/persistent-memory.html">https://www.hpe.com/us/en/servers/persistent-memory.html</a></li>
	<li><a href="https://persistentmemory.hpe.com/windows/nvdimm">https://persistentmemory.hpe.com/windows/nvdimm</a></li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.0.1.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>These Non-Volatile Memory&nbsp;drivers enable support for Persistent Memory technology on select HPE Servers running Microsoft Windows Server 2012 R2 and 2016.</p>

<ul>
	<li>Added support for HPE Persistent Memory devices (featuring Intel Optane DC Persistent Memory), on WS2012R2 and WS2016.</li>
	<li>Added support for HPE 16GB NVDIMM devices, on WS2012R2.</li>
	<li>Changed block sector size from 512B to 4096B. Old data won&#39;t be accessible and must be backed up first if it needs to be preserved.</li>
</ul>

<p>For more information about Persistent Memory technology offered on HPE Servers, please consult the following links:</p>

<ul>
	<li><a href="https://www.hpe.com/us/en/servers/persistent-memory.html">https://www.hpe.com/us/en/servers/persistent-memory.html</a></li>
	<li><a href="https://persistentmemory.hpe.com/windows/nvdimm">https://persistentmemory.hpe.com/windows/nvdimm</a></li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0efab16660ef48c2b6333da634ea3a4e" version="efb9f008e6164ee9a1f02ec497517294" lucid_version="p92.vmware@2.80_10-16-2020__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="53bb40aec8a14ed088d9afe01e9aba86" version="e50d5f3453dd405ba2a481a888406327" lucid_version="esxi6.7-utilities-sw-bundle-sc@2021.04.02__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.02" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Pickup latest SIGNED hpssacli.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.12.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Includes an updated the HPE Smart Storage Administrator CLI&nbsp;(SSACLI).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8dd88e1b96d74e199d82e65682ededf4" version="4c166e3167bf463e9a54b3ddfa067b59" lucid_version="qlogic.online.fw.esxi67_bl@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for&nbsp;16 Gb&nbsp;products.</p>

<table border="1" cellpadding="1" cellspacing="1">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td>UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE QMH2672 16Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>16Gb</td>
			<td>6.04.04</td>
			<td>8.08.232</td>
			<td>7.04</td>
			<td>3.43</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.02" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated&nbsp;the Firmware/BIOS/UEFI packages for 8 Gb and 16 Gb&nbsp;products.</p>

<p>&nbsp;</p>

<p>This Firmware package contains following firmware versions:</p>

<table border="1" cellpadding="1" cellspacing="1" style="width:800px">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>MBI</td>
			<td>Firmware</td>
			<td style="width:50px">UEFI</td>
			<td>Boot Bios</td>
		</tr>
		<tr>
			<td>HPE QMH2572 8Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>8Gb</td>
			<td>3.82.00</td>
			<td>8.08.207</td>
			<td>7.00</td>
			<td>3.56</td>
		</tr>
		<tr>
			<td>HPE QMH2672 16Gb Fibre Channel Host Bus Adapter for c-Class BladeSystem</td>
			<td>16Gb</td>
			<td>6.03.00</td>
			<td>8.08.231</td>
			<td>7.02</td>
			<td>3.43</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<ul>
	<li>Enhancements have been made to the firmware to prevent and better recover from the unexpected behavior described in Customer Advisory titled: &ldquo;HPE ProLiant, Synergy and Superdome Flex Host Bus Adapters (HBA) - Certain Fibre Channel HBA Firmware May Cause the Operating System to Halt and Potentially Compromise Filesystem Data Integrity&quot; at the following link:</li>
</ul>

<p>&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; <a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us">https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00094722en_us</a></p>

<ul>
	<li>Address unexpected behavior when Fibre Channel adapters were simultaneously running traffic to an array which supports 3PAR Persistent Checksum AND another array which is running T10-PI (also known as T10-DIF) or no block checksum technology at all</li>
	<li>Fibre Channel adapter firmware versions were not showing up as expected in the AHS log.</li>
	<li>Port statistics counters would sometimes not update in the event of Loss of Signal or Loss of Sync</li>
	<li>link downs would occur during specific frame sequences used by the HPE XP8 array after array-side link loss</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4fdb2c37f619467eb44cb380a68bf092" version="26a0e9fca5e04cc2bbfae7a4598f52e4" lucid_version="nmlx4_en.vmware65@2020.11.11__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.11.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New Features in version 3.16.11.10:</strong></p>

<ul>
	<li>Resolved an issue that caused the network adapter traffic to stop.</li>
	<li>Fixed an internal multicast loopback issue that broke LACP(Link Aggregation Control Protocol) bonding protocol.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.06.14" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and New Features in version 3.16.11.10:</strong></p>

<ul>
	<li>Resolved an issue that caused the network adapter traffic to stop.</li>
	<li>Fixed an internal multicast loopback issue that broke LACP(Link Aggregation Control Protocol) bonding protocol.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d8c86b5c3ce7444dbebf7bd215bf1a32" version="c967b9da294b44c9b2454162a3a43d32" lucid_version="nicfwupg_intel.linux_x64@1.21.6__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.21.6" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where Systems Insight Display (SID) modul is green when there&#39;s no Network connection.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.20.30" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an WOL issue that system wakes up automatically if any magic packet being sent before system was shut down.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="849f086e086c48be8b248502b935c97a" version="81118136e9504f57bd718b3fc3fca469" lucid_version="Shenandoah_sas.sles12.x86_64.rpm@07.716.02.00-rev2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="07.716.02.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="07.716.02.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial build</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="77de034d485c4fb1942e2bf46cd3c50b" version="dda393c5c45c4fa5a4fce7e43bc8d504" lucid_version="U17.VMware@2.80_10-16-2020(B)__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.80_10-16-2020(B) contains updates to the component packaging and is functionally equivalent to ver. 2.80_10-16-2020. It is not necessary to upgrade with Revision (B) if a previous component revision was used to upgrade the firmware to 2.80_10-16-2020.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000016 (CPUID 306F4) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.80_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000016 (CPUID 306F4) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="321dd379dd1a436ab919b4529b332ece" version="a51c7b7d3b844340a7ee56abd94485ea" lucid_version="U43.win.x64@2.20_10-27-2020-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.20_10-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>Addressed an issue where the &quot;Minimum Processor Idle Power Package C-State&quot; RBSU option was missing.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.20_10-27-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="39fa471cea234b3883e794de990ad252" version="3ce04928439d432f9674b31804140b14" lucid_version="MB001000GWCBC_MB002000GWCBD_x64@HPG6(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="771e2c2febad408da9107df2836d8e4d" version="70086c3a4faf40419d579e87c25c79aa" lucid_version="onboard_admin_fwsc.win@4.97__sc-windows-fw-bladeinf_cn,en,ja"/>
      <revision_history>
        <revision>
          <version value="4.97" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Onboard Administrator 4.97&nbsp;provides support for the following enhancements:</p>

<p><strong>Hardware additions</strong></p>

<ul>
	<li>None</li>
</ul>

<p>Features<strong>: additions and changes</strong></p>

<p><strong>General</strong></p>

<ul>
	<li>A new feature is added to SNMP to support enable/disable options for v1/v2c protocols.</li>
	<li>New SNMP traps were added for emergency brake (e-brake) activated and deactivated events.</li>
	<li>Added support for firmware update of new NIDEC fans.</li>
	<li>Enhanced PowerPIC firmware update to support firmware version 1.8.</li>
	<li>In the Onboard Administrator GUI added support for iLO HTML5 IRC console.</li>
</ul>

<p><strong>&nbsp;Security</strong></p>

<ul>
	<li>A new feature is added in SSH to support enable/disable of Key Exchange (KEX) Algorithms.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>General</strong></p>

<p>&nbsp;</p>

<ul>
	<li>Addressed an issue where running concurrent UPDATE ILO cli command from different SSH sessions cause few of the commands to end in operation failure.</li>
	<li>Fixed an issue in SET SERVER DVD CONNECT cli command usage in IPv6 environment.</li>
	<li>Addressed an issue where blade&rsquo;s ProductID update in System Rom RBSU is not reflected in the Onboard Administrator.</li>
	<li>Harnessed certificate read operation from flash to minimize certificate read failures.</li>
	<li>Fixed an issue in SNMP v3 protocol where EngineTime was not reset on increment of EngineBoot count.</li>
	<li>Addressed an issue related to blade discovery failure</li>
	<li>Fixed an issue in Smart Component where it fails to establish communication with Onboard Administrator using DHE ciphers.</li>
	<li>Addressed an issue related to ECDSA ciphers enable/disable feature.</li>
	<li>Added SSH cipher list to the configuration script</li>
	<li>Fixed an issue in Onboard Administrator GUI where IPv4 DynamicDNS could not be enabled when enclosure is configured for static IP configuration.</li>
	<li>Fixed help message display issues in CLI commands SET SSL_SESSION TIMEOUT and SET SECURESH.</li>
	<li>Addressed an issue in SNMP where EngineBoot count was incremented by two for add/delete of trap receiver.</li>
	<li>Fixed Online Help (OLH) pages display issue that occur when language pack is uploaded into Onboard Administrator.</li>
</ul>

<p><strong>Security</strong></p>

<p>&nbsp;</p>

<p>The following security vulnerabilities are fixed:</p>

<ul>
	<li>Onboard Administrator&rsquo;s web server response is enhanced to include X-Content-Type-Options security header.</li>
	<li>CVE-2011-3026 - libpng: Heap buffer overflow</li>
	<li>CVE-2018-1000517 - BusyBox wget version&nbsp; contains a Buffer Overflow vulnerability</li>
	<li>CVE-2020-1971 - EDIPARTYNAME NULL pointer de-reference</li>
	<li>CVE-2020-15861 - Net-SNMP allows Escalation of Privileges</li>
	<li>CVE-2020-15862 - Net-SNMP provides the ability to run arbitrary commands as root.</li>
	<li>CVE-2019-20892 &ndash; SNMPv3 get bulk request issue<br />
	&nbsp;</li>
</ul>

<p><strong>Issues and workarounds</strong></p>

<p>&nbsp;</p>

<p><strong>Browsers</strong></p>

<ul>
	<li>OA GUI is not accessible in Chrome versions 43.0.2357.10 to 44.0.2383.The issue was caused by a &ldquo;regression&rdquo; in Chrome (or WebKit). Customers should use an alternative browser like Firefox or Internet Explorer or try a different version of Chrome.</li>
	<li>SSO-to-iLO connection from the OA using an iLO host name fails with Microsoft Internet Explorer11 on Windows 8. On a Windows 8 system with Internet Explorer 10 or Internet Explorer 11, if the OA web GUI session is loaded using a host name instead of an IP address, an attempt to open an iLO window using SSO from the OA web GUI might result in the iLO page loading in the OA web GUI window instead of the intended new window. This issue was determined to be a bug in Internet Explorer and is expected to be fixed in a future release or update for Internet Explorer. To work around this issue, either use an IP address to load the OA Web GUI, or turn off Protected Mode for the appropriate zone in Internet Explorer&rsquo;s settings. This issue occurs only on Internet Explorer browsers.</li>
</ul>

<p><strong>FIPS</strong></p>

<p style="margin-left:40px">Certificates smaller than 2048 bits in size are not compliant with FIPS requirements as enforced by the OA firmware starting with OA 4.20. When the OA running OA firmware version 4.40 or greater is operating in FIPS Mode ON/DEBUG and is configured with a 1024-bit LDAP certificate that was installed when running a previous version of OA firmware, FIPS Mode ON/DEBUG is considered to be operating in a degraded state due to the presence of the non-compliant certificate. While operating in this FIPS-Degraded Mode operational state, attempts to set FIPS Mode OFF from the OA GUI Network Access&gt;FIPS tab will fail and show the error message The selected FIPS mode is already enabled. When the non-compliant certificate is removed, the FIPS-Degraded operational status is cleared, FIPS Mode can then be successfully set to OFF from the GUI interface. Note that the OA CLI command SET FIPS MODE OFF can be successfully used to set FIPS Mode OFF even with non-compliant 1024-bit LDAP certificates installed in the OA.</p>

<p><strong>IRC</strong></p>

<p style="margin-left:40px">Unable to open .net IRC console for Gen10 Blades, Gen9 Blades also have the same issue. The Java applet and Webstart however, loads but the virtual media mounting fails. The work around is to launch the IRC through IRC Application (HPE&nbsp;Lights-Out Stand Alone Remote Console) which is installed on terminal client.</p>

<p><strong>EFM</strong></p>

<p style="margin-left:40px">To use EFM on Gen 10 Blades, please select options/filters &ldquo;<em>Make Bootable ISO file&rdquo; and&nbsp;</em>&ldquo;<em>Enclosure Firmware Management&rdquo;</em>&nbsp;while creating custom SPP ISO on HPE SUM 8.0.0. Please refer to HPE SUM 8.0.0 User guide for further details.</p>

<p><strong>CAC</strong></p>

<ul>
	<li>In the CAC mode SSH, Telnet and XML Reply protocols will be disabled.</li>
	<li>Linked enclosure login will not work if the linked enclosure in CAC mode.</li>
	<li>If accurate Service account details are not provided, LDAP user login with certificate will fail.</li>
	<li>It is highly recommended to establish a recovery plan before getting started with CAC.&nbsp; If something goes wrong with the OA configuration, the OA may be recovered through the serial port or Insight Display panel and USB KEY. Both methods require physical access to the OA.&nbsp; However, if an LCD PIN has been configured (and forgotten) and local accounts have been disabled or CAC has been incorrectly configured then, the only way to recover is through a serial port. The two most common situations where OA recovery is needed are when LDAP has been configured incorrectly with local accounts disabled or when CAC has been configured without certificate access.</li>
</ul>

<p><strong>Configurable SSH Port Number&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong></p>

<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong></p>

<p style="margin-left:0in; margin-right:0in">If a Standby OA is running firmware version less than 4.85 and it is updated to firmware version greater than or equal to 4.85 using synchronize firmware feature from Active OA, after the firmware update and reboot of the Standby OA, SSH port will not open in the configured port number. The work around is to reboot the Standby OA and SSH port will open in the configured port in next boot. This issue will not occur in the case where SSH port is configured to default port 22 in the Active OA.</p>

<p style="margin-left:0in; margin-right:0in">&nbsp;</p>

<p><strong>Smart component</strong></p>

<p>&nbsp;</p>

<p style="margin-left:40px">When OA is in FIPS ON or FIPS TOP-SECRET mode and any of the ciphers that use&nbsp;&nbsp;&nbsp;Diffie-Hellman (DH) keys are enabled, firmware upgrade or downgrade using OA Smart&nbsp;&nbsp;Component 4.96 or earlier versions may fail with following error:</p>

<p style="margin-left:40px">&nbsp;&nbsp; Error: 1013: Client cannot connect with the Onboard Administrator. Verify the target address is correct and can be accessed from your system.</p>

<p>&nbsp;</p>

<p style="margin-left:40px">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p>

<p style="margin-left:80px">FIPS ON</p>

<p style="margin-left:80px">TLS_DHE_RSA_WITH_3DES_EDE_CBC_SHA<br />
TLS_DHE_RSA_WITH_AES_128_GCM_SHA25<br />
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384<br />
TLS_DHE_RSA_WITH_AES_128_CBC_SHA256<br />
TLS_DHE_RSA_WITH_AES_256_CBC_SHA256</p>

<p style="margin-left:80px">&nbsp;</p>

<p style="margin-left:80px">FIPS TOP-SECRET</p>

<p style="margin-left:80px">TLS_DHE_RSA_WITH_AES_256_GCM_SHA384</p>

<p>&nbsp;&nbsp;&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Same error may occur when OA upgrade or downgrade is performed through Smart&nbsp;&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Update Manager (SUM) resulting in the following error message in the SUM.</p>

<p>&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Component&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Package&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Deployment Status&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Log</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; ----------------------------------------------------------------------------------------------------------------------------------------------------------</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; cpC39063&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Online HPE BladeSystem c-Class Onboard Administrator for Windows&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Update returned an error&nbsp;&nbsp;&nbsp;&nbsp; View Log</p>

<p>&nbsp;</p>

<p style="margin-left:40px">&nbsp;&nbsp;&nbsp;When this failure occurs, the following message can be seen in the OA Smart Component&nbsp;&nbsp;log file.</p>

<p style="margin-left:40px">&nbsp;&nbsp; Error: 1013: Client cannot connect with the Onboard Administrator.</p>

<p style="margin-left:40px">&nbsp;&nbsp; Verify&nbsp;The target address is correct and can be accessed from your system.</p>

<p>&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The work-around for this problem is to disable all the ciphers that use DH&nbsp;&nbsp;key and rerun the firmware upgrade or downgrade.</p>

<p style="margin-left:40px">Disabling ciphers can be&nbsp;done using the CLI command DISABLE SSL CIPHER or through the GUI.&nbsp; The disabled ciphers can be re-enabled once the firmware upgrade or&nbsp;downgrade is completed.</p>

<p style="margin-left:0in; margin-right:0in">&nbsp;</p>

<p><strong>ILO5 Firmware Update</strong></p>

<p>&nbsp;</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The UPDATE ILO command is failing to update the iLO5 firmware versions 2.10 and later on&nbsp;OA version 4.90 and less than 4.90. This issue is caused by the introduction of new&nbsp;&nbsp; signature in the iLO5 firmware version 2.10.</p>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; The work-around is to update the OA firmware&nbsp;&nbsp;to 4.95 and then try the UPDATE ILO command. This issue will not occur with OA versions&nbsp;&nbsp;4.95 and later.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.96" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Onboard Administrator 4.96&nbsp;provides support for the following enhancements:</p>

<p><strong>Hardware additions</strong></p>

<ul>
	<li>None</li>
</ul>

<p>Features<strong>: additions and changes</strong></p>

<p><strong>General</strong></p>

<ul>
	<li>AlertMail feature now supports two priorities that a user can select for the AlertMail messages.</li>
	<li>Enclosure Firmware Management (EFM) feature is optimized to speed up the EFM update operation.</li>
	<li>The SSL certificate of Onboard Administrator now supports Fully Qualified Domain Name (FQDN) in <strong>Common Name</strong> (CN) field and IP address in <strong>SAN </strong>field.</li>
	<li>Common Access Card (CAC) Authentication feature is enhanced to support a configurable timeout for the SSL session.</li>
</ul>

<p><strong>&nbsp;Security</strong></p>

<ul>
	<li>Onboard Administrator supports two new TLS_DHE_RSA ciphers.</li>
	<li>FIPS TOP-SECRET mode ciphers are now supported in FIPS <strong>ON </strong>and <strong>OFF </strong>modes.</li>
	<li>CLI commands SHOW SSH CIPHER, ENABLE SSH CIPHER and DISABLE SSH CIPHER are added to Show, Enable and Disable SSH ciphers in FIPS ON and OFF modes.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>General</strong></p>

<ul>
	<li>Addressed an issue where SNMP queries to Onboard Administrator OIDs were not successfully completed when VLAN is configured for Blades and Interconnects.</li>
	<li>.Addressed an issue in the Device and Rack Summary GUI page to eliminate the duplicate display of FLB and Mezz adapters information.</li>
	<li>Addressed an issue where Interconnects were not receiving IP address from EBIPA (or) external DHCP server.</li>
	<li>Addressed an issue where Blade Location information was not displayed correctly in SHOW SERVER STATUS ALL CLI command.</li>
	<li>Addressed an issue where DNS record update was getting delayed in DNS server when a user configured a domain name in Onboard Administrator</li>
</ul>

<p><strong>Security</strong></p>

<ul>
	<li>None</li>
</ul>

<p><strong>Issues and workarounds</strong></p>

<p><strong>Browsers</strong></p>

<ul>
	<li>OA GUI is not accessible in Chrome versions 43.0.2357.10 to 44.0.2383.The issue was caused by a &ldquo;regression&rdquo; in Chrome (or WebKit). Customers should use an alternative browser like Firefox or Internet Explorer or try a different version of Chrome.</li>
	<li>SSO-to-iLO connection from the OA using an iLO host name fails with Microsoft Internet Explorer11 on Windows 8. On a Windows 8 system with Internet Explorer 10 or Internet Explorer 11, if the OA web GUI session is loaded using a host name instead of an IP address, an attempt to open an iLO window using SSO from the OA web GUI might result in the iLO page loading in the OA web GUI window instead of the intended new window. This issue was determined to be a bug in Internet Explorer and is expected to be fixed in a future release or update for Internet Explorer. To work around this issue, either use an IP address to load the OA Web GUI, or turn off Protected Mode for the appropriate zone in Internet Explorer&rsquo;s settings. This issue occurs only on Internet Explorer browsers.</li>
</ul>

<p><strong>FIPS</strong></p>

<p style="margin-left:40px">Certificates smaller than 2048 bits in size are not compliant with FIPS requirements as enforced by the OA firmware starting with OA 4.20. When the OA running OA firmware version 4.40 or greater is operating in FIPS Mode ON/DEBUG and is configured with a 1024-bit LDAP certificate that was installed when running a previous version of OA firmware, FIPS Mode ON/DEBUG is considered to be operating in a degraded state due to the presence of the non-compliant certificate. While operating in this FIPS-Degraded Mode operational state, attempts to set FIPS Mode OFF from the OA GUI Network Access&gt;FIPS tab will fail and show the error message The selected FIPS mode is already enabled. When the non-compliant certificate is removed, the FIPS-Degraded operational status is cleared, FIPS Mode can then be successfully set to OFF from the GUI interface. Note that the OA CLI command SET FIPS MODE OFF can be successfully used to set FIPS Mode OFF even with non-compliant 1024-bit LDAP certificates installed in the OA.</p>

<p><strong>IRC</strong></p>

<p style="margin-left:40px">Unable to open .net IRC console for Gen10 Blades, Gen9 Blades also have the same issue. The Java applet and Webstart however, loads but the virtual media mounting fails. The work around is to launch the IRC through IRC Application (HPE&nbsp;Lights-Out Stand Alone Remote Console) which is installed on terminal client.</p>

<p><strong>EFM</strong></p>

<p style="margin-left:40px">To use EFM on Gen 10 Blades, please select options/filters &ldquo;<em>Make Bootable ISO file&rdquo; and&nbsp;</em>&ldquo;<em>Enclosure Firmware Management&rdquo;</em>&nbsp;while creating custom SPP ISO on HPE SUM 8.0.0. Please refer to HPE SUM 8.0.0 User guide for further details.</p>

<p><strong>CAC</strong></p>

<ul>
	<li>In the CAC mode SSH, Telnet and XML Reply protocols will be disabled.</li>
	<li>Linked enclosure login will not work if the linked enclosure in CAC mode.</li>
	<li>If accurate Service account details are not provided, LDAP user login with certificate will fail.</li>
	<li>It is highly recommended to establish a recovery plan before getting started with CAC.&nbsp; If something goes wrong with the OA configuration, the OA may be recovered through the serial port or Insight Display panel and USB KEY. Both methods require physical access to the OA.&nbsp; However, if an LCD PIN has been configured (and forgotten) and local accounts have been disabled or CAC has been incorrectly configured then, the only way to recover is through a serial port. The two most common situations where OA recovery is needed are when LDAP has been configured incorrectly with local accounts disabled or when CAC has been configured without certificate access.</li>
</ul>

<p><strong>Configurable SSH Port Number&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong></p>

<p style="margin-left:0in; margin-right:0in">If a Standby OA is running firmware version less than 4.85 and it is updated to firmware version greater than or equal to 4.85 using synchronize firmware feature from Active OA, after the firmware update and reboot of the Standby OA, SSH port will not open in the configured port number. The work around is to reboot the Standby OA and SSH port will open in the configured port in next boot. This issue will not occur in the case where SSH port is configured to default port 22 in the Active OA.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8ab91a2b5ff149e8a59b3d86d5fbcc3d" version="a77e6866a83f46a1a35d16f76a8417ba" lucid_version="Apollo_Gen10_45xx.Lin@1.56(C)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.56" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added HPE Smart Array P824i-p controller&nbsp;support&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.56 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SUSE Linux Enterprise Server 15 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3ac61ed209fd49fb908341fa7b77c3ea" version="b59d963226f64c51b1431817280b8466" lucid_version="ssaducli.win_x64@5.10.44.0__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="5.10.44.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Adding support&nbsp;to the HPE&nbsp;SR Gen10 Plus&nbsp;Controllers.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a1969a6dced74b848f7c8392464ddc8c" version="d29fc94b9f5c4c378c479ec8f37909e2" lucid_version="lpfc.rhel8.x86_64@12.8.352.11__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.275.14" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 12.6.275.14</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5eee6ab16a2542c6ab8115b98b119c8f" version="de1c9c07fe0f4f4d834b26da4175dabe" lucid_version="ixgbe_bl.sles12@5.9.4-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.9.4-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 12 SP5.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.6.4-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8484f11834644aea8a2a14d1d0d58403" version="4cfe13454e1c4df894f88d52890c10c7" lucid_version="marvell_e4.win64@8.55.5.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="8.55.5.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an Wake-on-LAN (WoL) function unavailable.</li>
	<li>This product correct high CPU usage with Virtual Machine Multiple Queues (VMMQ).</li>
	<li>This product addresses a BSOD seen when using the netsh utility to configure global RSS.</li>
	<li>This product correct an issue which fixes BSOD in case of NicSwitch and send NBL has vport id which exceeds max vports capability.</li>
	<li>This product addresses a Windows Stop Error (BSOD) seen where an SR-IOV virtual function to assign while installing driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.50.10.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue which fixes the Virtual Function (VF) sleep duration on the channel while it waits for Physical Function(PF) response.</li>
	<li>This product correct an issue which System crashed when Single Root I/O Virtualization(SR-IOV) enabled on few partitions and disabled on few partitions using OneView.</li>
	<li>This product correct an issue which operating system boot failure after update Firmware to 08.50.27.</li>
	<li>This product correct an issue which System crashed is seen while upgrading drivers on enabled Network Partitioning (NPAR) and Single Root I/O Virtualization(SR-IOV) with enterprise data Center mode.&nbsp;</li>
	<li>This product correct an issue which Virtual Machines (VMs) crash randomly upon advanced property disable/enable with Max virtual functions (VFs) enumerated on all Physical Functions(PFs).</li>
	<li>This product correct an issue which System crashed seen while disabling Network Driver Interface Specification (NDIS) driver while running &nbsp;RoCEv2 IPv6 traffic on Management OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4cf79b782386458fa01aea2ca94f4962" version="28f66a2d6f1d44b59d144e5dee50c4c1" lucid_version="MM1000JEFRB_MM2000JEFRC_x64@HPD8(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8 (E)" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5cd2c31f18d541c09e937a83715365ee" version="a2871e4bb75b4433a7b38b1a5e50eaa7" lucid_version="qfle3.vmware65@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an incorrect MTU value displayed by the ESXCLI tool.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.14" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue where Purple Screen Of Death(PSOD) when ethernet link connected to 533FLR-T/536FLR-T Adapters.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="308794285e444711a0eb3833d54eb10e" version="7e4baf405fae43b691ff59270bb5c701" lucid_version="EH000900JWCPH_EH000600JWCPF_x64@HPD8(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update improves performance for random read workloads with delays between reads.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8e4da865e5b44ea38e4b650ce9a93715" version="139146773b66413e911e830525227a74" lucid_version="MB008000JWWQP_MB006000JWWQN_x64@HPD2(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c47b4b11bb744418a62b9ae668fd0ea6" version="dbbb547126dd49c9a172e29ce2c6aa71" lucid_version="VO000960JWTBK_VO001920JWTBL_VO003840JWTBN_x64@HPD7(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="edc1764ca6d04bbd943cd314f29904b6" version="09cc22faf5214b179feab91b33133b7b" lucid_version="MB4000GEFNA_MB6000GEFNB_x64@HPG6(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b3f391bd1aa44685b17f74a3d4ddf32c" version="04113cbd23174aefba554409620997fd" lucid_version="netxtreme2_bl.rhel8@7.14.76-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="7.14.76-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 8, Updates 2&nbsp;and 3.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.14.63.1-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>These drivers correct an issue where iSCSI target discovery fails to complete when booting from SAN or a local HD.</p>

<p>These drivers have been recompiled with a build setting that allows SUM to identify them correctly for installation on systems they support.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d2e7aa5024a34aef908b398a3c4e0625" version="a1e6ea89c5c54463b0eaa2d4888cdf11" lucid_version="SmartDQ.win@106.12.6.0-rev3__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="106.12.6.0" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for AMD.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 0/1/5/10 Fault Tolerant Modes.&nbsp;</p>

<p style="margin-left:48px">This issue does not impact systems that have not enabled Smart Array s100i support.</p>

<ul>
	<li>For additional information, reference&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097789en_us">Customer Bulletin a00097789en_us. </a></li>
</ul>

<p style="margin-left:48px"><strong>IMPORTANT INFORMATION:</strong></p>

<ul>
	<li>An array configured with a single RAID 0 logical drive is NOT affected.</li>
	<li>An array configured with a single RAID 1 logical drive is NOT affected.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="106.12.6.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for AMD.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Addressed an issue where the HPE Smart Array s100i Software RAID may experience potential data inconsistency during initial configuration or operation of a RAID volume configured in RAID 0/1/5/10 Fault Tolerant Modes.&nbsp;</p>

<p style="margin-left:48px">This issue does not impact systems configured in other RAID configurations such as RAID 0 or 1. This issue does not impact systems that have not enabled Smart Array s100i support.</p>

<ul>
	<li>For additional information, reference&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00097734en_us" style="color:#0563c1; text-decoration:underline" target="_blank">Customer Bulletin a00097734en_us</a>.</li>
</ul>

<p style="margin-left:48px"><strong>IMPORTANT INFORMATION:</strong></p>

<ul>
	<li>An array configured with a single RAID 0 logical drive is NOT affected.</li>
	<li>An array configured with a single RAID 1 logical drive is NOT affected.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5e76fbf672b8432aa6436d748dacb463" version="ef11319d45874ea5aaee0661212f8edc" lucid_version="MB008000JWJRQ_MB006000JWJRP_ESXi@HPD8__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware release provides additional protections against hangs in certain corner cases, and cleans up some error handling and command behavior issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ccde97956825448f97ee8427bc2eccdb" version="1372fc9624c54e198d6c2c7b19848bb0" lucid_version="hpepqiesrv.win@1.2.1.65__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.2.1.65" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed for the version information</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.1.64 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Corrected unknown or unrecognized class information in the System Event Log.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="239d1dd26f2c4614bfcd9033d0a83734" version="337d9c52c43747febf42f57b47fa2e5e" lucid_version="EG000600JWFUV_EG001200JWFVA_ESXi@HPD3(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="G" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (F)" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f0faaea8688741debca7931ae839b647" version="c7591184ddea4b9986320216bc40df2e" lucid_version="hpdsa.sles15.x86_64.rpm@1.2.10-182__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.2.10-182" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added Support for SUSE Linux Enterprise Service 15.2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.10-176" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for SUSE Linux Enterprise Services15 SP1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4f88f457c2f54e169ae4af95c2b1199f" version="8cc616e5d3184452b20245ea5acad6b2" lucid_version="mlnxcx4.w2k12r2@2.60.23957.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.60.23957.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses a Windows Stop Error (BSOD) seen when running Mellanox NdStat Utility (mlx5cmd -ndstat) while ND connections was closing.</li>
	<li>This product corrects driver loading failures seen due to incorrect INF file.</li>
	<li>This product correct an issue where the vSwitch unavailable to assign on WS2012R2.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40.22511.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ol>
	<li>The number of VMs is limited to 124 VMs with VMQ(Virtual Machine Queue) mode.</li>
	<li>The driver supports up to 200 vPorts in ConnectX-4 Lx and 254 vPorts in ConnectX-5 with SRIOV(Single Root I/O Virtualization).</li>
</ol>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ol>
	<li>This product correct an issue which caused memory corruption in case the OS provided continues memory across multiple pages that did not start with offset zero on aligned memory address.</li>
	<li>This product correct an issue that prevented the device from being updated with the new driver because the driver was already in the driver store.</li>
	<li>This product correct an issue which occasionally prevented the VF counters from being displayed correctly in perfmon.</li>
	<li>This product correct an issue which caused the driver to report zero link speeds supported when working with firmware older than 1x.18.0240.</li>
	<li>This product correct an issue which fixed a memory leak issue in error flow during driver initialization.</li>
</ol>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ae6fc04bc51546468d12da8ed18bb5b3" version="06c39365e33749a39deeb680a7f50dab" lucid_version="mlnx_en_roce_mlx5.rhel8u2.x86_64.rpm@5.2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.2" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.2:</strong></p>

<p><strong>For ConnectX-5 Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>CQE compression support for Rx multi-strides packets.</li>
		<li>Configuring QoS on a single QP or on a group of QPs.</li>
		<li>Encap/decap hardware offload of IPv4 traffic over MPLS-over-UDP. This can be used in networks with MPLS routers to achieve more efficient routing.</li>
		<li>Connection tracking rules on VFs to forward traffic from one VF to the other.</li>
		<li>Offloading sFlow sampling rules.</li>
	</ul>
	</li>
</ul>

<p><strong>For ConnectX-5 Adapters and ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>A locking mechanism to enable parallel insertion of rules into the software steering using the mlx5dv_dr API. The parallel insertion improves the insertion rate and takes place when adding Rx and Tx rules via the FDB domain.</li>
		<li>Option to match mlx5dv_dr API on Geneve tunnel using a dynamic flex parser. The option header consists of class, type, length and data. The parser should be configured using devx command, after which a rule can be created to match on parser ID and data.</li>
		<li>Geneve tunneling offload, including matching on extension header.</li>
		<li>Parallel insertion and deletion of offloaded rules using multiple&nbsp;OVS threads.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>[Beta] Modify GTP-U TEID. This support requires flex parser&nbsp;configuration.</li>
		<li>[Beta] Improved performance of OVS Connection Tracking flows by&nbsp;enabling the merge of the multi-table flow matches and actions into one joint flow.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Dx Adapters and above:</strong></p>

<p>Added support for the following features:</p>

<ul>
	<li>Transmitted packet timestamping accuracy can be improved when using a timestamp generated at the port level instead of a timestamp generated upon CQE creation. Tx port time-stamping better reflects the actual time of a packet&#39;s transmission. This feature is disabled by default. The feature can be enabled or disabled using the following command. ethtool --set-priv-flags tx_port_ts on / off.</li>
	<li>Offloading tunnel rules when the source interface is VF (in addition to uplink) in the Hypervisor.</li>
	<li>Using Mirroring Offload with Connection Tracking.</li>
	<li>ASO flow meter using the mlx5dv_dr API, which allows for monitoring the packet rate for specific flows. When a packet hits a flow that is connected to a flow meter, the rate of packets through this meter is evaluated, and the packet is marked with a color copied into one of the C registers, according to the current rate compared to the reference rate.</li>
	<li>ASO first hit using the mlx5dv_dr API, which allows for tracking rule hits by packets. When a packet hits a rule with the ASO first hit action, a flag is set indicating this event, and the original value of the flag is copied to one of the C registers.</li>
	<li>mlx5dv_dr API support for matching on a new field &quot;gtpu_first_ext_dw_0&quot;. This field enables packet filtering based on the GTP-U first extension header (first dword only). To enable parsing of tunnel GTP-U extension header, run the following command. ./cloud_fw_reset.py FLEX_PARSER_PROFILE_ENABLE=3.</li>
</ul>

<p><strong>For&nbsp;ConnectX-6 Lx Adapters and above:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>IPsec full offload support for extended sequence number, replay protection window and lifetime packet limit.</li>
	</ul>
	</li>
</ul>

<p><strong>For&nbsp;All HCA&#39;s:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>New query GID API that allows for querying a single GID entry by its port and GID index, or querying for all GID tables of a specific device. This API works over ioctl instead of sysfs, which accelerates the querying process.</li>
		<li>Performing multi-host firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reload.</li>
		<li>[Alpha] Firmware live patching in the driver. Live patching updates the firmware without the need to perform firmware reset. However, it can only be applied in scenarios where the difference between the current and new firmware versions are minor, which is decided upon by the firmware itself.</li>
		<li>devlink tool for performing firmware reset in order to upgrade the device firmware. Firmware reset loads the new firmware in case it was burnt on the flash and was pending activation, and reloads the current firmware image from the flash in case no new firmware was pending. For further information, please refer to the the devlink man page.</li>
		<li>A resiliency mechanism for the driver to manually poll the command event queue (EQ) in case of a command timeout. In case the resiliency mechanism finds unhandled event queue entry (EQE) due to a lost interrupt, the driver will handle it, after which the command interface returns to a healthy state.</li>
		<li>Setting a sniffer private flag is deprecated and no longer required. In order to capture offloaded/RoCE traffic, tcpdump can now be run on the RDMA device.</li>
		<li>Added per-port reporters to devlink health to manage per-port health activities. Users can now access the devlink port reporters by specifying the port index in addition to the device devlink name through the devlink health commands API. This update was first introduced in iproute2 v5.8. As part of this feature, mlx5e Tx and Rx reporters are now redefined as devlink port reporters. For examples, please see devlink-health manpage</li>
		<li>Optimized memory consumption of memory registration in huge page systems. As an example, in a 2MB huge page system, 600 MB would be saved for 100 GB memory registration.</li>
		<li>mlx5dv API to modify the configured UDP source port for RoCE packets of a given RC/UC QP when QP is in RTS state.</li>
		<li>Accelerating Tx datapath by saving PCI bandwidth and CPU utilization. The savings are achieved by aggregating multiple packets into a single WQE. The feature is driven by xmit_more for certain traffic types, such as UDP.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.2:</strong></p>

<ul>
	<li>Clearing min_rate on all SR-IOV legacy VFs after setting min_rate to at least one of the VFs did not disable QoS min_rate.</li>
	<li>An empty /usr/src/mlnx-ofa_kernel/default is now no longer created.</li>
	<li>An issue where installing packages through a repository failed after generation of metapackages using --add-kernel-support. The failure occurred due to excessive and incorrect Obsolete headers in those metapackages.Enabled installation of mlnx-ofa_kernel package to /bin/python3 instead of / usr/bin/python3 on RHEL 8.x systems.</li>
	<li>All IPoIB offload packets were wrongly counted as rx_csum_complete. These packets are now identified as rx_csum_unnecessary packets.</li>
	<li>mlx5dv_dr_rule_destroy segmentation fault could happen in rare cases with multiple rules on the same matcher with a different number of actions. This could happen after reusing an already deleted rule memory with less actions.</li>
	<li>An issue of moving to SwitchDev mode after configuring DSCP (Differentiated Service Code Point).</li>
	<li>Global traffic class configuration did not take effect on DC QPs (Dynamically Connected Queue Pairs).</li>
	<li>ib_send_bw traffic frequently dropped to zero when RDMA CM was used, because of incorrect&nbsp;min_rnr_timer setting on the responder side. The min_rnr_timer setting is now aligned with the setting in non-RDMA CM cases.</li>
	<li>Traffic did not pass over VFs with VST QinQ feature is enabled.</li>
	<li>When traffic was sent over Geneve VLAN with Tx VLAN offload enabled and TSO (TCP Segmentation Offload)&nbsp;or Tx csum enabled, traffic could be dropped and not sent to the wire.</li>
	<li>An issue that caused the firmware to restart upon installing mlnxofed-dpdk-upstream-libs package manually.</li>
	<li>Bad utility paths in rdma-core &quot;dracut&quot; hooks on SLES systems, which used to result in the following errors when running &quot;dracut&quot; with the &quot;--add rdma&quot; option. dracut-install:
	<ul>
		<li>ERROR: installing &lsquo;/usr/libexec/mlx4-setup.sh&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/mlx4-setup.sh dracut-install: ERROR: installing &lsquo;/usr/libexec/rdma-set-sriov-vf&rsquo; dracut: /usr/lib/dracut/dracut-install -D /var/tmp/dracut.UdCOSJ/ initramfs /usr/libexec/rdma-set-sriov-vf</li>
	</ul>
	</li>
	<li>Traffic class value was not updated in DCT when set via sysfs.</li>
	<li>A doorbell loss issue on AMD platforms with Secure Memory Encryption (SME).</li>
	<li>Registering memory using mlx5dv_devx_umem_reg while forking. Without this fix, applications which use fork() or similar syscalls while using a memory registered with umem_reg could hang due to incorrect physical page mapping. This fix requires setting the IBV_FORK_SAFE environment variable.</li>
	<li>When&nbsp;unbinding the device resulted in the following message being printed to the dmesg: &quot;failed to disable DC tracer&quot;</li>
	<li>Content of file /sys/class/net//statistics/ multicast might have been out of date and might have displayed values lower than the real values.</li>
	<li>ERSPAN (Encapsulated Remote SPAN) protocol was available only when turning off Tx checksum offload.</li>
	<li>A udev script issue which caused non-mellanox devices to be renamed.</li>
	<li>Missing representor statistics when using ifconfig.</li>
	<li>Fixed wrong value of skb mark of received packets on representors.</li>
	<li>An issue which caused second port representors to be named as first port representors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Changes and new features in HPE Mellanox RoCE driver&nbsp;version 5.1:</strong></p>

<ul>
	<li>Added support for the following features:
	<ul>
		<li>The user can now set a packet pacing rate on the special queues that forward traffic from one physical port to the other.</li>
		<li>Connection Tracking (TC) offload on network interfaces that are in NIC mode, as opposed to SwitchDev mode. Note: This support is currently available for interfaces with physical functions only.</li>
		<li>Limiting SMP MADs on the wire using a Send window mechanism. This allows the user to keep track of the outstanding number of SMP MADs per-port, and allows for limiting this number to shape traffic when the pace of SMP MADs requires control.</li>
		<li>Direct Rule (DR) API support for sampling action to allow duplication and sampling of some ratio of the traffic. The API also allows to perform a set of different DR actions on the sampled traffic.</li>
	</ul>
	</li>
	<li>Enabled on-demand device memory sync to free cached memory.&nbsp;</li>
	<li>Simplified the sanity test that verified which systems must use python3 and not python2, so that when rebuilding the kernel packages using --add-kernel-support, the systems based on RHEL/CentOS 8 were detected.&nbsp;</li>
	<li>Added back rx_dct_connect counter that queries the number of received connection requests for the associated DCTs</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 5.1:</strong></p>

<ul>
	<li>Extended mlx5 recovery-flow delay on VF driver when PCI interface went down</li>
	<li>ibv_get_device_list returned only accessible devices.</li>
	<li>&ldquo;rpmbuild&rdquo; (that includes basic support for building RPM packages) was not installed by the install script on SLES15 SPx systems when trying to rebuild packages.</li>
	<li>AF_XDP was not functional.</li>
	<li>neohost-backend and neohost-sdk packages were not properly removed by the uninstallation procedure and might have required manual removal before re-installing or upgrading MLNX_OFED driver.</li>
	<li>During MLNX_OFED installation, warning messages related to modules iw_cxgb3 and iw_nes might have appeared in the log.</li>
	<li>Command timeouts occurred when the Hypervisor disabled the VF&#39;s PCI interface. This fix reduces the device removal time to 2 seconds.</li>
	<li>MLNX_OFED/MLNX_EN installer will no longer automatically remove the spdk package when installing the driver.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="27c04cd9178a40abb16f9409a4957000" version="cc56f8eb530242988bdb51624abb5cd8" lucid_version="MB4000GEFNA_MB6000GEFNB_ESXi@HPG6(H)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d09d3bc174174ab69b229c1370a5ce48" version="472c76d84358440e8dcf6f46511a4e03" lucid_version="EG000300JWSJP_EG000600JWJNH_EG001200JWJNK_x64@HPD2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="386eb9df6414454ca63bfe17b21ac760" version="d47a5a14853d45daaae563592e9c5c58" lucid_version="MB008000JWWQP_MB006000JWWQN_ESXi@HPD2(C)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="950aa10923d94fe39adbfe18fa1f4f69" version="b84df531ebff46cd852c26f657f1d0b0" lucid_version="be2_bl.w2k16@12.0.1195.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1195.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3fa689b1e0c54064af40f5128fac0e5b" version="d1953cb3dddb46558bf5dd5cdccd4992" lucid_version="MB014000GWRTN_MB012000GWRTL_MB010000GWRTK_ESXi@HPG2(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ffc5db5b28504df99cd08b4bf08ccc7d" version="78c334e5f6094fde8245444c9d5ca7ab" lucid_version="SPSGen10.Win.x64@04.01.04.423-rev1__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="04.01.04.423" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="04.01.04.423" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the Server Platform Services (SPS) Firmware contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the Server Platform Services Firmware provides mitigations for security vulnerability documented as CVE-2020-8755. This security vulnerability is documented in Intel Security Advisory INTEL-SA-00391. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e0822b357e024225a58d203426c0d686" version="fb12431d29f0473889e007503eb43659" lucid_version="MB004000JWFVK_MB006000JWFVL_x64@HPD3(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="15b4903e0d104da184afbca47ab6234b" version="09c9fe93422b439a99cf3bb12c1b7881" lucid_version="MB4000JEXYA_MB6000JEXYB_x64@HPD9(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="40ac168079914e77b07d902faf8d27db" version="adc0f7486c2e4410af71e13eceebc06a" lucid_version="U13.VMware@2.80_10-16-2020__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e5d8389759aa4832a8475a2ff763f16b" version="c544a421a31c4531bb6b8af729eaa718" lucid_version="VO000960JWZJF_VO001920JWZJH_VO003840JWZJK_x64@HPD4__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modify Drive Vendor Identification String (VID) in Inquiry page from &ldquo;HP&rdquo; to &ldquo;HPE&rdquo;.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Increased Queue Size from 32 to 128 to be equal to the max number of chips.</li>
	<li>Refresh NM SRAM area periodically only when idle as a possible work around on NM SRAM parity error.</li>
	<li>Change the error response as 0x3 (SP_Busy) or 0x07 ( NO_SESSION_AVAILABLE) when host attempts to open another session while a session is already opened.</li>
	<li>Disable verify compare if APP_CHK=0</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="249ebde928b24f7cb7ebdd3c20053940" version="1b95fab71aaf4a879d0b4706c082a423" lucid_version="EK000200GWEPD_EK000400GWEPE_EK000800GWEPF_EK00_x64@HPG3(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a35c5c84e8e149fe9fff61ed94a4a7ac" version="fc959504d0a14bd78d2f9a092504c608" lucid_version="VO0400KEFJB_VO1200KEFJC_VO2000KEFJD_x64@HPK4(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SLES12SP1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="536a9a6bb7f448b9be57c310c5a0b4ef" version="ca777ad6a7614b7d80877b1e5d3e3e2d" lucid_version="U13.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="113bb71009854458ba860147296f93b4" version="bc565d0b36d544ec995833ca638c5fdf" lucid_version="isut-esxi.esxi70@2021.04.00__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the <a href="https://techlibrary.hpe.com/us/en/enterprise/servers/solutions/info-library/index.aspx?cat=smartupdate&amp;subcat=isut#.XmhyMagzZPY">iSUT Release Notes</a> for information about the enhancements added&nbsp;in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the <a href="https://techlibrary.hpe.com/us/en/enterprise/servers/solutions/info-library/index.aspx?cat=smartupdate&amp;subcat=isut#.XmhxlqgzZPY">iSUT Release Notes</a> for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.12.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>See the <a href="https://techlibrary.hpe.com/us/en/enterprise/servers/solutions/info-library/index.aspx?cat=smartupdate&amp;subcat=isut#.XmhyMagzZPY">iSUT Release Notes</a> for information about the enhancements added&nbsp;in this release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>See the <a href="https://techlibrary.hpe.com/us/en/enterprise/servers/solutions/info-library/index.aspx?cat=smartupdate&amp;subcat=isut#.XmhxlqgzZPY">iSUT Release Notes</a> for information about the issues resolved in this release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="65745918a4694cd0a7c96fde04278213" version="0ff7d2cb59c94744bf68b5821e0ae522" lucid_version="emulex_fcoe_x64.win_bl@12.0.1192.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1192.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Updated to driver version 12.0.1192.0</p>

<p>Removed the raw driver file folder.&nbsp; The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:<br />
<br />
&nbsp;&nbsp;&nbsp; brcmdrvr-fcoe-version.exe /q2 extract=2<br />
<br />
The extracted files are located:<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version<br />
<br />
Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version\x64\win2012</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f68cbf39561d4281ab240a4897aa0415" version="10de5bd087fa4a8aa1999e518b6e79bf" lucid_version="U21.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="935cb1f792604e6aaead9dbf6e50463c" version="fddd605d0f4b4b3e8eac3b776bf5e9a2" lucid_version="EG0300JFCKA_EG0600JEMCV_EG0900JFCKB_EG1200JEMD_x64@HPD6(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="011fd838183d4fe38c4af2e3f27ece00" version="b8b62b868b8847fdbe93e646676f8067" lucid_version="Shenandoah.esxi7.0_bundle@2021.04.01-rev2__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Initial&nbsp;release for the MR416i-p, MR216i-a, MR416-a, MR216i-p drivers</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2021.04.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Initial Build for the MR416i-p, MR216i-a, MR416-a, MR216i-p drivers</strong></p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3ed50c140ece462d9878c300a512c4f5" version="2b418b1cf2454e5d9af13cfa6c71ef45" lucid_version="vsm.fwsc.win@4.3.6.0(C)__sc-windows-fw-bladeinf_en"/>
      <revision_history>
        <revision>
          <version value="4.3.6.0" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>
	<p style="margin-left:0in; margin-right:0in">Improved integration with Smart Update Manager</p>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.3.6.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for&nbsp;Microsoft Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="451308857c63431786ef6960ba605a64" version="f4fa59f7657a46b49ac8ec4f38076edc" lucid_version="MB2000GCWLT_MB3000GCWLU_MB4000GCWLV_x64@HPG4(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cad34a66b4fc4a06bf8a262ac99afab3" version="9dc69c717b5840878cb37e21f6f3a865" lucid_version="ixn_bl.w2k19@4.1.197.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="4.1.197.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation library ixtmsg.dll.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.1.143.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8bcfdc333663490ba14bb0a7e2286062" version="ff406fc4a93f4a84b8c37010f4fc22ac" lucid_version="D6020.fwsc.esxi@2.74(I)__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="2.74" revision="I" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v191364/D6020_v2.74I.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.74 (H)" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following fixes were&nbsp;incorporated in this version:</strong></p>

<ul>
	<li>Temperature sensors logic inside gSEP model and SES database</li>
	<li>When an IOM is pulled the surviving IOM reports false critical temperatures</li>
</ul>

<p>Please refer to the&nbsp;<a href="https://downloads.hpe.com/pub/softlib2/software1/pubsw-linux/p1194926978/v183133/D6020_P07232-008.html"><u>Release Notes</u></a>&nbsp;for the complete listing of fixes, enhancements, known issues and work-arounds corresponding to this firmware.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eec8feb6cff84dc79bfbc2fc3ee22488" version="91356dfd2b574e7aaccd3a59a0bfd081" lucid_version="MB6000JVYYV_x64@HPD2(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="341b142bb61745f792508954cf786af9" version="a580c721dedc4316afb93995088fe0d6" lucid_version="P89.Linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137.  This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="64cacd5223744f8db526479e2a86e773" version="1c671ff8414c4d91818629790cf7a0f0" lucid_version="ixgben_bl.vmware67@2019.12.20__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2019.12.20" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects a&nbsp;recursion termination condition so that recursion&nbsp;correctly ends in the case of&nbsp; PCIe link down.</p>

<p>This product addresses an issue where the ixgben driver has high CPU overhead&nbsp;when an SFP+ module is absent.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e3347115cdc54c64abafd1793b901484" version="b9631f0be28b4898a03bc75cbbbdb270" lucid_version="qlfle3_bl.vmware65@2021.04.19__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.19" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports VMware vSphere 6.5 U3.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.12.20" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses a VMkernel&nbsp;critical error&nbsp;(PSOD) seen during N-Port ID Virtualization&nbsp;(NPIV) VM power off.</p>

<p>This product addresses a PSOD seen&nbsp;with FCoE.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dd5b092a7dec4d3e9ecd257e4f87af47" version="90e50c8ec51142778ad28c7f963aff19" lucid_version="be2iscsi.sles15@12.0.1342.0-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports SUSE Linux Enterprise Server 15 Service Pack 1 and&nbsp;SUSE Linux Enterprise Server 15 Service Pack 2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="644b370c36714c6490fce699ffce22e9" version="d8b06a92707d4b72871ede7c1c64c3e9" lucid_version="U37.fwpkg@2.42_01-23-2021__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5618354fdcd14e80979abf0ff965a3f7" version="0c2af031ff7542d9ba938890af81420f" lucid_version="aep_ddrt_dimm@01.02.00.5435(B)__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="01.02.00.5435" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains mainly performance improvements.</p>

<p>This product now supports Red Hat Enterprise Linux 8, SUSE Linux Enterprise Server 12 and VMware ESXi 7.0.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="01.02.00.5435" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains mainly performance improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="77f2ff3d7ebf4999a5ec47887c09ecdf" version="b724da62b8994d3dbf9ef3f6720001c5" lucid_version="MZPLJ1T6HBJR-000H3_MZPLJ3T2HBJR-000H3_MZPLJ6T_x64@EPK74H3Q-rev1__sc-linux-fw-open-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="EPK74H3Q" revision="" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
	<li>The Idle Power Management fix to keep the drive from entering and exiting the Lower Power Idle mode too frequently.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00112800en_us</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="EPK74H3Q" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Optimized T-offset setting.</li>
	<li>Change MQES setting to 8192.</li>
	<li>Fixed LED Behavior misaligned specs issue.</li>
	<li>Fixed performance drop issue when 4+ SSD are installed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a473be5520454dd493b4181c89c38278" version="2c43cde3dbea42e4b20b37ee7784749a" lucid_version="qlgc_openiscsi.rhel8u0@2.0-873.113-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.0-873.113-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="12bc299e14c0483f95f66950ee1bea77" version="e3a4f5c54acb4a5dac4f8ca4f09a183b" lucid_version="bnxt.rhel8@1.10.2-218.0.67.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.10.2-218.0.67.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 8 update 2 and Red Hat Enterprise Linux 8 update 3</li>
	<li>This product now supports PAM4 speeds information in&nbsp;ethtool tools&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses an issue where system crashed on doing driver unload load in loop when running broadcast traffic</li>
	<li>This product addresses an issue where bnxt_en module crashes with NULL pointer deference before ifup(bring up network interface)</li>
	<li>This product addresses an issue where kernel panic after PCIe AER(Advanced Error Reporting) device recovery successful</li>
	<li>This product addresses an issue where bnxt_en crashes with NULL pointer dereference when enabling SRIOV</li>
	<li>This product correct an error where ethtool -S tx_bytes and rx_bytes counter values far exceed actual values</li>
	<li>This product correct an error message when querying hwmon temperature on VF via sysfs</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.10.1-216.0.169.4" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 8 Update 1</li>
	<li>This product now sets Maximum Transmission Unit(MTU) default value from firmware returned value</li>
	<li>This product now not support user establishing connections using RDMA communication manager(CM) when Priority-based Flow Control (PFC) configured VLAN ID is 0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects an issue which offload is not happening on bond(vf and virtio) interface after the fail over with VF as the active slave</li>
	<li>This product corrects an issue which driver loading failed on kdump kernel.</li>
	<li>This product corrects an issue which RoCE driver causes input&ndash;output memory management unit(IOMMU) warnings</li>
	<li>This product corrects an issue which RoCE Link Aggregation (RoCE LAG) when Maximum Transmission Unit(MTU) was changed.</li>
	<li>This product corrects an issue which Link up failed after resuming from hibernation</li>
	<li>This product corrects an issue which Virtual Function RoCE driver causes Virtual Machine to be rebooted</li>
	<li>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="01713b1febed4cc9a463023eeb2cf6ee" version="e80490f86e23458a80c86d1588c117fe" lucid_version="MK000240GWKVK_MK000480GWJPN_MK000960GWJPP_MK00_x64@HPG5(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG5" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a rare link loss issue and adds enhancements for drive reliability.</li>
	<li>After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.</li>
	<li>The new drive bootloader code will be activated after the next drive power cycle.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us</a></li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG5 (C)" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a rare link loss issue and adds enhancements for drive reliability.</li>
	<li>After HPG5 firmware is downloaded to the drive, the new HPG5 firmware will be active on the drive.</li>
	<li>The new drive bootloader code will be activated after the next drive power cycle.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00072768en_us</a></li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="151b3249eb8946acb43e16f663033dfa" version="2967067fa0064d0381dd7464c1e8ea02" lucid_version="VO0400KEFJB_VO1200KEFJC_VO2000KEFJD_ESXi@HPK4(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="11a6992c4ec7430e9b4f2b44f5d06fe1" version="9fd6d7637c6d4917a99111f0453038b8" lucid_version="bnxtnet.vmware70@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which Purple Screen Of Death (PSOD) while running &nbsp;Virtual SAN (vSAN) over &nbsp;Remote Direct Memory Access (RDMA) traffic due to invalid Completion Queue Element (CQEs)</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.14" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2ef4b1fccb0b4e4aa4c8281327ada522" version="5094c3687a294a379cbdd89ef6fae593" lucid_version="qla2xxx.sles15.x86_64_legacy@10.02.01.00.a14-k1__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.01.00.a14-k1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 10.02.01.00.a14-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.01.00.64.15.1-k1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated Driver for:</p>

<p>SuSE Linux Enterprise Server 15 Service Pack&nbsp;1 version 10.01.00.64.15.1-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9548ad0612e149baa76eccbb5ce95cee" version="cb3cf49c131c43dbbd880aa0106af292" lucid_version="MO001600KWVNB_MO003200KWVNC_MO006400KWVND_x64@HPK3__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>Fixed SSD weargauge report error issue.</li>
	<li>Fixed Assign FWState as TR_DONE_ERR at the correct location.</li>
	<li>Prepare proper response data for Get Message Type Supported MCTP Command.</li>
	<li>Added code to preserve current feature values cross live firmware update.</li>
	<li>Allocate 4 bytes instead of 2 bytes for parameter code.</li>
	<li>Changed the value for NLB equal to NSize -1.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c3a161d21e2947f3af496f6cde08c95f" version="e9dd3ae6827c4dd9b2ee860fabf647e4" lucid_version="MB2000GFEMH_MB4000GFEMK_x64@HPG6(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.Â  This issue was found during supplier ongoing reliability testing.</li>
	<li>
	<p>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</p>
	</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (F)" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.  This issue was found during supplier ongoing reliability testing.</li>
	<li>
	<p>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</p>
	</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6c850a8782474532b42a51c8d341beac" version="b323183f5407417ea4d0c6075671750e" lucid_version="Gen10Plus_UBM2_Backplane_PIC.Esxi@1.16__sc-linux-fw-array_en"/>
      <revision_history>
        <revision>
          <version value="1.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial release</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="55c20afa55214e04bc6d7e8985b8d0b6" version="840b6903ae464c1bb89d3c61967cb719" lucid_version="EG001800JWFVC_x64@HPD3(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a5c4c8dc7b4a47d3abf311a168b0a29d" version="08ff3a3ba3fd4dc5900fdc7a89393788" lucid_version="EK0800JVYPN_EO1600JVYPP_MK0800JVYPQ_MO1600JVYP_x64@HPD7(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="C" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL: <a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us</a>.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (B)" revision="B" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The issue affects SSDs with an HPE firmware version prior to HPD7 that results in SSD failure at 40,000 hours of operation (i.e., 4 years, 205 days 16 hours), neither the SSD nor the data can be recovered, after the SSD failure occurs.</li>
	<li>In addition, SSDs which were put into service at the same time will likely fail nearly simultaneously.</li>
	<li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href="https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us">https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-a00097382en_us</a>.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c740e1c15c784d9bb5ce0ea0e215f139" version="276224996c4d4c65b0fd07dca2feb64b" lucid_version="p85.win.x64@2.80_10-16-2020(B)__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>Ver. 2.80_10-16-2020(B) contains updates to the firmware packaging and is functionally equivalent to ver. 2.80_10-16-2020. It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 2.80_10-16-2020.</p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.80_10-16-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e382d013e99549e7a97161015561d31e" version="6d7c2749736b46a2a8d83bec0de0b73d" lucid_version="bnxtnet.vmware65@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which Purple Screen Of Death (PSOD) while running &nbsp;Virtual SAN (vSAN) over &nbsp;Remote Direct Memory Access (RDMA) traffic due to invalid Completion Queue Element (CQEs)</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.14" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue where RDMA Ethernet Controller error description on ESXi Host.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5db40f307a93428cb2929e6801c9f6ed" version="fc50dd7d9ed04af4aaf03b52e08f2ffd" lucid_version="Apollo_2000.Lin@1.00(C)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.00" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SUSE Linux Enterprise Server 15&nbsp; OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.00 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Improved integration with Smart Update Manager.</li>
</ul>

<p style="margin-left: 40px;">Note: Upgrading to version 1.00(B) is not necessary if the Apollo 2000 SAS Expander was previously updated to version 1.00.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4a88cfeb4a984c96a13ab1090bcaab71" version="94c469cdb1be47998e2b35d3fd753df2" lucid_version="MLNX_Ethernet_Only_NIC_FW_package.esxi70@1.0.1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5044 :</strong></p>

<p>&nbsp; &nbsp;779799-B21 (HPE Ethernet 10G 2-port 546FLR-SFP+ Adapter)<br />
&nbsp; &nbsp;779793-B21 (HPE Ethernet 10G 2-port 546SFP+ Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.29.1016:</strong></p>

<p>&nbsp; &nbsp;817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.29.1016:</strong><br />
&nbsp; &nbsp;817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</p>

<p><strong>Firmware for the following device is updated to 16.29.1016:</strong></p>

<p>&nbsp; &nbsp;874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</p>

<p><strong>New features and changes in version 14.29.1016:</strong></p>

<p style="margin-left:40px">Added support for the following features:</p>

<ul>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>cq_overrun counter: This counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p><strong>New features and changes in version 16.28.1016:</strong></p>

<p style="margin-left:40px">Added support for following features:</p>

<ul>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Steering DP hash flow groups.</li>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>PCIe Rx modifications to prevent the adapter cards from disappearing from the system.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
	<li>cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>[Beta]&nbsp;Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>ixes submitted in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) &nbsp;NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that caused&nbsp;packets to drop due to header size issues and/or failing checks. The issue was caused due to a Linux issue that caused&nbsp;VFs to set the wrong header size value in wqe_inline_header_mode input.</li>
	<li>When MKEY_BY_NAME was&nbsp;enabled by NVCONFIG and a large number of VFs were configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>&nbsp;An issue that caused&nbsp;the device to go to dead IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.&nbsp;</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>&nbsp;An issue that prevented&nbsp;VXLAN packets with svlan/ cvlan tag from being matched.</li>
	<li>The&nbsp;eth_wqe_too_small counter to count&nbsp;ODP page used to fail.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>An issue that resulted in low performance after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.</li>
	<li>An issue that caused&nbsp;the device to go to dead IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 2.42.5044 :</strong></p>

<p>&nbsp; &nbsp;779799-B21 (HP Ethernet 10G 2-port 546FLR-SFP+ Adapter)<br />
&nbsp; &nbsp;779793-B21 (HP Ethernet 10G 2-port 546SFP+ Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.27.4000:</strong></p>

<p>&nbsp; &nbsp;817749-B21 (HPE Ethernet 25Gb 2-port 640FLR-SFP28 Adapter)</p>

<p><strong>Firmware for the following devices are updated to 14.27.4000:</strong><br />
&nbsp; &nbsp;817753-B21 (HPE Ethernet 25Gb 2-port 640SFP28 Adapter)</p>

<p><strong>Firmware for the following device is updated to 16.27.2008:</strong></p>

<p>&nbsp; &nbsp;874253-B21 (HPE Ethernet 100Gb 1-port 842QSFP28 Adapter)</p>

<p><strong>New features and changes in version 16.27.2008:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New features and changes in version 14.27.4000:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction:
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Fixes submitted in version 2.42.5044 :</strong></p>

<ul>
	<li>An issue that prevented the firmware from detecting a link_down event thus preventing the IB bond interface from going to a failover mode.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.27.4000:</strong></p>

<ul>
	<li>The sent packet hung while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>The completions (CQ)completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.&nbsp;</li>
	<li>The fragmented IP packets were dropped.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7cdc9cd1c70149848e6e26c6af8613a5" version="51005bcbd2fb480a9f049a581ad94152" lucid_version="elxiscsi_bl.vmware67@2019.12.20__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2019.12.20" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7a409aa1e5444a57b8b10f884c98ae5f" version="e3e9525cbf9e4cd9a3568ee12f365d20" lucid_version="vxn.w2k19@2.1.191.0(B)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.1.191.0" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">This product now&nbsp; supports the following the network adapters:</p>

<ul style="list-style-type:square">
	<li>HPE Ethernet 10Gb 2-port 561FLR-T Adapter</li>
	<li>HPE Ethernet 10Gb 2-port 561T Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.1.191.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0d61f1ea72cf4d4991d4093a05f8808a" version="c34aa76301cc44ed932bb02ef65f5f7f" lucid_version="MT001600KWHAC_MT003200KWHAD_MT006400KWHAE_x64@HPS1(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPS1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPS1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bc34fe37ff6f4e0b9f7866222b805e05" version="d46e4c1d21f54177a615a7aa45fe9846" lucid_version="VK000150GWCNN_VK000240GWCNP_VK000480GWCNQ_x64@HPG1(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f0c6d80ec7ba4100b11a93d13a983f16" version="9618ed9dc6844f03970889cad066d536" lucid_version="Tinker_FW_Esxi@1.0.14.1052__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.14.1052" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>&nbsp;</p>

<ul>
	<li>Added support for Gen10+ Snap4 models: NS204i-d, NS204i-t, NS204i-r</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.14.1047" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Initial Firmware Smart Component release for HPE Gen10+ Boot Controller</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f2f901fd357f4c6692fae66dcbbb15ed" version="725a4aed694a459998940a94170f2ff2" lucid_version="u44.fwpkg@2.20_10-27-2020-rev1__fwpkg-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.20_10-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>Addressed an issue where the &quot;Minimum Processor Idle Power Package C-State&quot; RBSU option was missing.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.20_10-27-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bbe1b570fa0b489d9f3ea7ce12b8f909" version="8359557e7e404ddfb9de8efe90f3027b" lucid_version="emulex_fcoe_x64.w2k19_rt@12.0.1192.0(f)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1192.0" revision="f" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Added support for following:</p>

<p>Updated to driver version 12.0.1192.0</p>

<p>Removed the raw driver file folder.&nbsp; The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:<br />
<br />
&nbsp;&nbsp;&nbsp; brcmdrvr-fcoe-version.exe /q2 extract=2<br />
<br />
The extracted files are located:<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version<br />
<br />
Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version\x64\win2012</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1192.0 (d)" revision="d" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Added support for following:</p>

<p>Updated to driver version 12.0.1192.0</p>

<p>Removed the raw driver file folder.&nbsp; The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:<br />
<br />
&nbsp;&nbsp;&nbsp; brcmdrvr-fcoe-version.exe /q2 extract=2<br />
<br />
The extracted files are located:<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version<br />
<br />
Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version\x64\win2012</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<table>
	<tbody>
		<tr>
			<td>
			<ul>
				<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
			</ul>
			&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></td>
		</tr>
	</tbody>
</table>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9aa489b872204af29fd466db29be29fa" version="7f9840894d3d417c9e7db6d3d61dd138" lucid_version="P230i_P430_P431_P731m_P830i_P830.win_x64@5.02__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="5.02" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>The firmware updates could fail while SmartCache is enabled due to active I/O in the Smart Cache.</li>
	<li>The serial output of the expander could fail to be populated in the controller logs due to the buffer not being handled appropriately by the controller</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.54 (A)" revision="A" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Improved Integration with Smart Update Manager</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6cc89934ad1740b582b096e05315f04a" version="301df59b8e4e463d84bf5bd4de2c9a91" lucid_version="MB014000JWUDB_x64@HPD2(D)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="749b691cbdee45b1901a105f2f1d7a48" version="5324c45a18f548328abc9f74279c0012" lucid_version="U20.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c901792d2373446f89ecbbbaab9a8f09" version="dd56668620fb4ffb99be094656d7c8c2" lucid_version="HP-CNA-FC-Broadcom-Enablement.sles15.x86_64@12.0.1339.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.0.1339.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version: 12.0.1339.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1264.0 (b)" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version: 12.0.1264.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<table>
	<tbody>
		<tr>
			<td>
			<ul>
				<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
			</ul>
			&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></td>
		</tr>
	</tbody>
</table>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="365d207e25654d61b3829f731965d204" version="bf7553f20c2c45a68e3bb7d6aad8fb04" lucid_version="EH000900JWCPH_EH000600JWCPF_x64@HPD8(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD8" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update improves performance for random read workloads with delays between reads.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="32cb58a13b764af9aba40956dbeca3b6" version="90b6d3b309174d6f86065034ff4ebdab" lucid_version="cisss3.w2012.x86_64@106.26.0.64__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="106.26.0.64" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>System could potentially&nbsp;display a BSOD while executing a hot replace due to a memory aligment problem</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="100.20.0.64 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for Microsoft Windows Server 2019.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f433cea5bd0849d286e6c1b1e45a60d4" version="cd4be0be3e2e449db1f2aeabc8dd6f4f" lucid_version="MB6000JVYZD_MB4000JVYZC_x64@HPD4(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="86ed65a9ad3d4de69d4874b14dbe2a9a" version="b90333ff56d04a63a5c221754fa46c9f" lucid_version="qlfle3_bl.vmware67@2021.04.19__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.19" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports VMware vShere 6.7 U3.<br />
This product has improved handling of complex flooding and race condition issues.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses a PSOD involving an encapsulated header.<br />
This product addresses a PSOD seen during traffic scheduling.<br />
This product corrects an incorrect MTU value displayed by the ESXCLI tool.<br />
This product addresses a PSOD issue seen during Storage vMotion operation.<br />
This product addresses PSODs seen during discovery timeout, transmit scheduling, and LUN reset scenarios.<br />
This product addresses a PSOD seen on systems operating in a complicated VLAN environment.<br />
This product addresses a PSOD seen during critical packet drop scenarios.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2019.12.20" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses a VMkernel&nbsp;critical error&nbsp;(PSOD) seen during N-Port ID Virtualization&nbsp;(NPIV) VM power off.</p>

<p>This product addresses a PSOD seen&nbsp;with FCoE.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ab8b689939f94b78976081b76f12fa41" version="b277a830033240b4a5a985cfb14cfe76" lucid_version="be2.w2k12r2@12.0.1195.0(C)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1195.0" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports the following network adapters:</p>

<ul>
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1195.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dcd60b858b6c4ac298dc49b61299aeb5" version="45bde9430773406fb2b796799e73862c" lucid_version="nicfwupg_qlflq.win64@5.2.4.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.2.4.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains support PLDM firmware upgrade base improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.2.3.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product corrects the abnormal disconnection of iLO web page while performing under Shared Networking on Flexible-LOM.</li>
	<li>This product addresses an issue where the HPE Ethernet 10/25Gb 2-port 622FLR-SFP28 and &nbsp;HPE Ethernet 10/25Gb 2-port 621SFP28 adapter UMCE (Uncorrectable Machine Check Exception) was followed by Unrecoverable I/O error, Uncorrectable PCI express error on Server and one of the ports suddenly no longer can send or receive traffic.</li>
	<li>This product addresses an issue where driver doesn&rsquo;t load upon booting up by correct memory relocation.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fdcd2417f5b44570a83d4b1a96ea2478" version="713c43e07cd74641a292dcc844f52f57" lucid_version="PICGen9.win.x64@1.0.9(I)-rev1__sc-windows-fw_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.0.9(I)" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>Ver. 1.0.9(I) contains updates to the component packaging and is functionally equivalent to ver. 1.0.9.  It is not necessary to upgrade with Revision I if a previous component Revision was used to upgrade the firmware to version 1.0.9.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addresses an issue in which the minimum power capping value was incorrectly being calculated on certain systems.  This fix increases the accuracy of the minimum capping value set during POST.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.9(I)" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>Ver. 1.0.9(I) contains updates to the component packaging and is functionally equivalent to ver. 1.0.9.  It is not necessary to upgrade with Revision I if a previous component Revision was used to upgrade the firmware to version 1.0.9.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Addresses an issue in which the minimum power capping value was incorrectly being calculated on certain systems.  This fix increases the accuracy of the minimum capping value set during POST.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="78fc77876f754f93b5ef96248fa664b1" version="ae53a398a9c74968aef2d220f2d67d15" lucid_version="hpsa3.w2012.x64@62.16.2.64__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="62.16.2.64" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix error handling of AHCI reported Fatal errors with NCQ and Non-NCQ commands in SATL potentially causing RAID stack timeouts and excessive read/write command timeouts leading to SCSI bus reset with M.2 SSD drives configured with SW RAID.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="62.12.0.64 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Improved integration with Smart Update Manager.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="5dd47ac24fdd4dd783c15530b1c51692" version="de8e1535518d4e4498bc70a5ea77a4a1" lucid_version="ql_iscsiuio.sles15sp0@2.11.5.13-3(B)-rev2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.11.5.13-3" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product no longer supports ProLiant Blade servers and devices. Blade&nbsp;servers and devices&nbsp;are now supported by the&nbsp;<a href="https://www.hpe.com/global/swpublishing/MTX-f399524fff61468eae3c47fd12">HPE Blade QLogic NX2 iSCSI Offload IO Daemon for SUSE Linux Enterprise Server 15 SP0</a>.</p>

<p>This product no longer supports Synergy servers and devices. Synergy servers and devices are now supported by the&nbsp;<a href="https://www.hpe.com/global/swpublishing/MTX-cb89d67a37bf4e67b982b1dcc0">HPE Synergy QLogic iSCSI Offload IO Daemon for SUSE Linux Enterprise Server 15 SP0</a>.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an&nbsp;iSCSI discovery failure with VLAN.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.11.5.13-3 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an&nbsp;iSCSI discovery failure with VLAN.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4a7391c65f0b46d485ea7105b1cfb339" version="e9bca1ac7c864024a1a5d1aab3e43da9" lucid_version="a47.linux@2.40_02-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.40_02-23-2021" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support for AMD EPYC 7003 processors.<p>Added support for Direct Liquid Cooling solution.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.<p>Added a new BIOS/Platform Configuration (RBSU) for Platform RAS Policy to control the Platform Resiliency and Serviceability (RAS) policy. This option controls whether platform firmware or the operating system has control of corrected error handling and reporting.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>HPE ProLiant XL675d Gen10Plus CPLD version 0F<p>HPE Apollo 6500 Gen10 Plus Chassis CPLD version 0909<P><B>Problems Fixed:</B></P>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4998c3a06d0e4ed8ac22e37618080a1f" version="dc0fa2598792465d8d5eaab1e2679052" lucid_version="P220i_P222_P420i_P421_P721m_P822.win_x64@8.32(C)__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="8.32" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Improved Integration with Smart Update Manager</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.32 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added HPE Digital Signature</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d90597ae6e7441a698018da6a13176bc" version="e5fc3b642cf5449d99c1cb8ba85bc66f" lucid_version="matrox.G200eH.win2012.x64@9.15.1.224__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="9.15.1.224" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fix for random screen corruption when changing resolution that could occur with driver versions 9.15.1.184 and 9.15.1.218.</li>
	<li>Fix for a display freeze that could occur when running the Windows Display Diagnostics tool (dispdiag.exe).</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="9.15.1.184" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Improved video performance compared to the 9.15.1.174 release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="22bf9e4ced19410ca8b8850245112a89" version="ffaf778df3c840f69d3fec6f2cd4fc32" lucid_version="MO0200JEFNV_MO0400JEFPA_MO0800JEFPB_MO1600JEF_ESXi@HPD3(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD3" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="676bdef4b7644815a191aa651f44dc5d" version="0dd0d7a56b7b4b0d8fd452ebc0303ad7" lucid_version="brcmfcoe.rhel7.x86_64@12.0.1342.0__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1342.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1342.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1259.0 (c)" revision="c" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to Driver version 12.0.1259.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<table>
	<tbody>
		<tr>
			<td>
			<ul>
				<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
			</ul>
			&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></td>
		</tr>
	</tbody>
</table>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="926b8a90acf147dd8614685a9453a0ed" version="1dab5bf9eb75410999037da04153edc7" lucid_version="ixgbe.sles12.x86_64@5.9.4-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="5.9.4-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product enhances reliability via adding support for new mailbox communication between PF(Physical Function) and VF(Virtual Function) and remove its potential flaws that may lead to the undefined or faulty behavior</li>
	<li>This product enhances compatibility where new mailbox api implementation is alo compatible with old drivers</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.7.1-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product update Linux kernel documentation and Configure IRQ affinity tools</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1ff674590ea54295a0a402207a50999a" version="8a623fc47ccb4689921f70c98423a92e" lucid_version="bnxt_roce.rhel7u9.x86_64@218.0.7.0__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="218.0.7.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3aebaee5a0504648985c2d89d7e4e8d9" version="1ccd5db7ab204de39c63a7259172160f" lucid_version="VK0120GFDKE_VK0240GFDKF_VK0480GFDKH_VK0960GFDK_x64@HPG1(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG1" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG1 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="eff3fb3bc296490cb954337b0cfc0052" version="4ad38537a1c84790ba61b0c31ed58589" lucid_version="mlnx_en_roce.sles12sp4.x86_64.rpm@4.9(A)__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.9" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="705c5706f7b64a23bc5fcf7fbd4a5be7" version="1f4cb3994034431591590d05d214c6a3" lucid_version="MB4000JEXYA_MB6000JEXYB_x64@HPD9(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cff92813aa394a808304dff72295152b" version="7ec0ddeec2514f92a584d20b278cfa37" lucid_version="ixgbevf.sles12.x86_64@4.9.3-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9.3-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product enhances reliability via adding support for new mailbox communication between PF(Physical Function) and VF(Virtual Function) and remove its potential flaws that may lead to the undefined or faulty behavior</li>
	<li>This product enhances compatibility where new mailbox api implementation is alo compatible with old drivers</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product update Linux kernel documentation and Configure IRQ affinity tools</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="68ce71d480544726b13cf1bf182ff422" version="33ba810b1e7a4e6089ce1ea388348ad2" lucid_version="p85.linux@2.80_10-16-2020__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains the latest support for Red Hat Enterprise Linux 8.x Server. Ver. 2.76_10-21-2019(B) contains updates to the firmware packaging and is functionally equivalent to ver. 2.76_10-21-2019.&nbsp; It is not necessary to upgrade with Revision B if a previous component revision was used to upgrade the firmware to version 2.76_10-21-2019.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-0151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fcc983919bfc411fa0536a632fac1e38" version="cb8d45c15706411e8416dae1af18c4a0" lucid_version="hpgen9.win@10.1.17969.8134__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.1.17969.8134" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Updated to match the latest version available from Intel for the devices supported by this component.</li>
	<li>Removed Windows Server 2012 to align operating system support with the production Service Pack for ProLiant.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.1.17809.8096" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Windows Server 2019.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8de9ca424f8f4678aeecd66cdfe60068" version="119129998bb641aba1a4c18b486640bf" lucid_version="EH0300JDXBA_EH0450JDXBB_EH0600JDXBC_x64@HPD5(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d431c0fab9a74249883baa6f26e0c6aa" version="5fd35e9bf09f465d81dd6c8916162e91" lucid_version="vxn.w2k12_r2@1.2.199.0(B)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.2.199.0" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0px; margin-right:0px; text-align:left">This product now&nbsp; supports the following the network adapters:</p>

<ul style="list-style-type:square">
	<li>HPE Ethernet 10Gb 2-port 561FLR-T Adapter</li>
	<li>HPE Ethernet 10Gb 2-port 561T Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.199.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="dc8e1d549b6c46c4a9bd046b4dd1950e" version="4668f8028f6b4d53af0f7ecd8a2d0e69" lucid_version="EH0600JDYTN_x64@HPD7(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a data integrity risk where stale data is mistakenly used from cache.</li>
	<li>Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.</li>
	<li>Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (F)" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Fixes a data integrity risk where stale data is mistakenly used from cache.</li>
	<li>Fixes a data integrity risk where stale data is returned on an unaligned overlapped write-read operation.</li>
	<li>Fixes a data integrity risk during a sequential read and write workload when a recovered error is encountered, which could cause incomplete data to be read. </li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2292648d1a8a4c6db1c16819d8335faf" version="cee280b6ccca4b71b1af9d8eba25e0ee" lucid_version="u26.Linux@2.66_07-19-2019__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.66_07-19-2019" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>None</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for an Intel sighting where the system may experience a machine check after updating to the latest System ROM which contained a fix for an Intel TSX (Transactional Synchronizations Extensions) sightings. The previous microcode was first introduced in the v2.62 System ROM. This issue only impacts systems configured with Intel Xeon&reg; D-1500 processors. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.64_04-04-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>Updated the Intel processor microcode to the latest version.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="36e4d61e9116490288f4da49e28def20" version="2c841fddfbb64e23bec22456fe365dbb" lucid_version="be2iscsi_bl.w2k19@12.0.1171.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1171.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c94eb717d55e4213952a8c5723962404" version="c248489df93f409f8f1704814d6cf1ef" lucid_version="U39.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e880844ad1a74e7f8866fa15b1ed3ae6" version="e1c64836e7654865bd0f860ada5ac18d" lucid_version="MLNX_Open_Ethernet_NIC_MFT_FW_package.esxi67@1.0.4__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is&nbsp;updated to 14.29.1016:</strong></p>

<p>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)<br />
P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</p>

<p><strong>Firmware for the following devices is&nbsp;updated to 16.29.1016:</strong></p>

<p>P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)<br />
P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)<br />
P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)</p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<p><strong>New Feature and Changes in Version 14.29.1016 and 16.29.1016:</strong></p>

<ul style="list-style-type:square">
	<li>Ethernet wqe_too_small Mode: A per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p style="margin-left:40px">Added support for the following features:</p>

<ul style="list-style-type:square">
	<li>cq_overrun counter: The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>Enabled the capability to allow Virtual Functions to send Pause Frames packets. (Beta)</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
</ul>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<ul style="list-style-type:square">
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p style="margin-left:40px">Added support for the following features:</p>

<ul style="list-style-type:square">
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats:</li>
	<li>Responder Mini CQE With Flow Tag Layout.</li>
	<li>Responder Mini CQE With l3_l4_info Layout.</li>
	<li>Steering DP hash flow groups.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 14.29.1016 and 16.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that caused packets to drop due to header size issues and/or failing checks. This issue was caused due to a Linux issue that caused VFs to set the wrong header size value in wqe_inline_header_mode input.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) might take longer than when MKEY_BY_NAME was disabled.</li>
	<li>In rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that caused the eth_wqe_too_small counter to count ODP page faults.</li>
	<li>A low performance was observed after enabling the RoCE Accelerator capability.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is&nbsp;updated to 14.27.4000:</strong></p>

<p>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)<br />
P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</p>

<p><strong>Firmware for the following devices is&nbsp;updated to 16.27.2008:</strong></p>

<p>P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)<br />
P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)<br />
P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)</p>

<p><strong>New Feature and Changes in Version 14.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observerd while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0c95f7c054f047b69fbfe7c93264a982" version="165b632ec89b4fb793c47ad6ae7acf76" lucid_version="MB008000JWJRQ_MB006000JWJRP_x64@HPD8__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD8" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This firmware release provides additional protections against hangs in certain corner cases, and cleans up some error handling and command behavior issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="aa6bec5edbc1481bba28cd93023707d3" version="8d00b8c4469341cfb065995caa857b19" lucid_version="MB6000GEBTP_x64@HPG4(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="955cffa0d4fe4b76923c0ea7afeca0bf" version="3ff52e73e0ec4103a3cc3ad83afdfb80" lucid_version="nicfwpkg_intel_e810_xxv4@2.24__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="2.24" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial version</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f148b53c7b96447699a0d01706827644" version="e98b14b335c2497f9d9247e43badcea8" lucid_version="MLNX_IB_Only_CX4_CX5_HCA_FW_package.x64@1.0.7__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.7" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.28.1002:</strong></p>

<p>843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)<br />
<br />
<strong>New Feature and Changes in Version 12.28.1002:</strong></p>

<ul>
	<li>Increased the maximum XRQ number to 512.</li>
</ul>

<p><br />
<strong>Firmware for the following devices are updated to 16.29.1016:</strong></p>

<p>872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)<br />
872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of the cluster.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compared to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats: Responder Mini CQE With Flow Tag Layout Responder Mini CQE With l3_l4_info Layout</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT&nbsp;command.</li>
	<li>Steering DP hash flow groups.</li>
	<li>A new counter per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>PCIe Rx modifications to prevent the adapter cards from disappearing from the system.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
	<li>cq_overrun counter. The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>[Beta]&nbsp;Enabled the capability to allow Virtual Functions to send Pause Frames packets.</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that prevented&nbsp;VXLAN packets with svlan/ cvlan tag from being matched.</li>
	<li>An issue that caused the&nbsp;eth_wqe_too_small counter to count&nbsp;ODP (On-Demand Paging) page faults.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>&nbsp;Ani ssue that resulted in low performance after enabling the RoCE Accelerator capability. Note:&nbsp;The fix is available when all ports are set as Ethernet.&nbsp;</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>The chassis manager calculation for Multi-Host and Socket-Direct adapter cards to allow running NC-SI commands by the chassis manager BMC. Now the chassis manager is count as BMC with index 0, regardless of how many BMC there are.</li>
	<li>An issue that caused&nbsp;the device to go to down IRISC as one of the firmware semaphores could not be released&nbsp;when a speed change or port state change was triggered.&nbsp;</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.28.1002:</strong></p>

<ul>
	<li>An issue that caused the DCR (DC Resources) to be destroyed before the retry option managed to work when the retry timeout is too big. in this case, the DCR&#39; time-to-live was increased, and the maximum retry timeout was decreased.</li>
	<li>Increased PHY power consumption limit to 1.5w.</li>
	<li>An issue that caused PortCounters.PortRcvErr / PPCNT.infiniband_counters.PortRcvErr not to report port icrc errors.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 12.27.4000:</strong></p>

<p>843400-B21 (HPE Apollo A10 InfiniBand EDR (100Gb) 2-port Adapter)<br />
<br />
<strong>New Feature and Changes in Version 12.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><br />
<strong>Firmware for the following devices are updated to 16.27.2008:</strong></p>

<p>872723-B21 (HPE Apollo InfiniBand EDR 100Gb 2-port 841z Mezzanine Adapter)<br />
872725-B21 (HPE InfiniBand EDR 100Gb 1-port 841QSFP28 Adapter)<br />
&nbsp;</p>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 12.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observered while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b88ebb63a68747808884160b11c000eb" version="a1d6c87c6f5846a992a7a4a2617d15bc" lucid_version="vxs.w2k19@2.1.191.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="2.1.191.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.1.138.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d4f71c14a668436aace9f00c7057e76e" version="e1c3dc3aa9974b18b7f7e85eebe8b96f" lucid_version="U25.win.x64@2.80_10-16-2020__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390.  These issues are not unique to HPE servers.<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2bca574323fb4462b57e23c3b359f69c" version="2310590f205e43e0ae97f59492d0a40a" lucid_version="esxi70-cru-drv-bundle-sc@2020.04.01(A)__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2020.04.01" revision="A" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add new supported servers</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.04.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Support&nbsp;for VMware ESXi 7.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8aa4f1e30dfc4417885cea85b551314e" version="9b6c89640e0948e1b0bafd59a155335c" lucid_version="iLO5_FW.LINUX@2.42__sc-linux-fw-ilo_en"/>
      <revision_history>
        <revision>
          <version value="2.42" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>- Added Server Identity (iLO IDevID, iLO LDevID, System IDevID, System IAK and Platform certificates)&nbsp;<br />
&nbsp; capability to uniquely identify a server across networks that is cryptographically verifiable<br />
- EAP-TLS based authentication for onboarding into an 802.1X access-controlled network<br />
- Enabled support for Intel VROC</p>

<ul>
	<li>Device discovery and inventory of VROC SATA Controller and drives attached to it</li>
	<li>Firmware inventory of Intel VROC(VMD NVMe RAID) and VROC SATA Controller</li>
</ul>

<p>- Extend size for firmware versions supported to 48 bytes<br />
- Liquid Cooling support for Apollo systems<br />
- Server Platform Services Descriptor verification and recovery<br />
- Enabled Discovery, Inventory and Thermal support for Pensando Cloud Adapters</p>

<ul>
	<li>P41849-B21: Pensando DSP DSC-25 Cld-SP 10/25Gb Card</li>
	<li>P41852-B21: Pensando DSP DSC-100 Cld-SP 100Gb Card</li>
</ul>

<p>- For Synergy, restricted the capability to change below settings.</p>

<p>&nbsp; Note : Changes to these settings can affect communication between One-view and iLO</p>

<ul>
	<li>iLO Web service&nbsp;</li>
	<li>iLO Web service Non-SSL Port</li>
	<li>Web server SSL Port</li>
	<li>iLO RIBCL Interface</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>- Corrected Product Name listed under Device Inventory as &quot;NVIDIA Quadro M3000SE&quot;, that was wrongly listed as &quot;Synergy 75W MXM Mezzanine&quot; with iLO firmware v2.16 and higher<br />
- iLO stops monitoring the second Pensando card after the first one fails with a PCIe error<br />
&nbsp;</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.41" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support to import large sized LDAP CA certificate</li>
	<li>Support enablement for latest Intel Persistence Memory</li>
	<li>iLO GUI to display the Host Operating System Version</li>
	<li>Display platform Resiliency and Serviceability (RAS) policy in iLO GUI</li>
	<li>Added standard redfish schema support for Computer System &ndash; Reset, Graceful restart actions&nbsp;</li>
	<li>Real CPU temperature is reported in addition to normalized temperature (this feature requires ROM 2.40 version)</li>
	<li>Support for Active Health System logging by RDE ( Redfish Device Enablement ) enabled devices</li>
	<li>Support alerting feature for RDE ( Redfish Device Enablement ) enabled devices&nbsp;</li>
	<li>Ability to control LED for locating direct attached SATA drives</li>
	<li>Ability to reset power for direct attached SATA drives&nbsp;</li>
	<li>Added write protect setting feature for Liquid cooled Delta/Redstone GPU cards.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>iLO 5 reporting incorrect Power Supply count with iLO 5 v2.10</li>
	<li>Continuous logging to IML of a CHIF Error running ESXi with iLO 5 v1.46</li>
	<li>Random messages &quot;smad[]: No response from iLO for Hello&quot; seen in certain Operating Systems&nbsp;</li>
	<li>Incorrect MAC address shown in iLO for Synergy 4820C network adapter</li>
	<li>InfiniBand card not syncing with Oneview in iLO 5 v2.30</li>
	<li>Copy/paste may not work for more than 255 characters to VSP terminal in Linux platforms&nbsp;</li>
	<li>547FLR / 1100Q NIC may reset to default mode after flashing from 1.48 to 2.xx</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="24a612c609984b6d85fe7fd4ee8bdcc3" version="c07eb3e84dc2404a968ffb147b972246" lucid_version="MLNX_Ethernet_Only_NIC_MFT_FW_package.esxi67@1.0.4-rev1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device is&nbsp;updated to 14.29.1016:</strong></p>

<p>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</p>

<p><strong>Following New features and Changes are included in version 14.29.1016:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in version 14.29.1016:</strong></p>

<ul>
	<li>An issue that caused the sent packet to hang while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>A rare case where the the device froze&nbsp;while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance while using the VSC to trigger the send_ring_doorbells.</li>
	<li>An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.</li>
	<li>An issue that caused the fragmented IP packets to drop was fixed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following device is&nbsp;updated to 14.28.1002:</strong></p>

<p>P11338-B21 (HPE Ethernet 10Gb 2-port 548SFP+ Adapter)</p>

<p><strong>Following New features and Changes are included in version 14.28.1002:</strong></p>

<ul>
	<li>Added mlxconfig support for power reduction: PCI CAP AUTO_POWER_SAVE_LINK_DOWN
	<ul>
		<li>PCI CAP</li>
		<li>AUTO_POWER_SAVE_LINK_DOWN</li>
	</ul>
	</li>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in version 14.29.1016:</strong></p>

<ul>
	<li>An issue that caused the sent packet to hang while the device entered FLR mode.</li>
	<li>Enabled Bar configuration bytewise by applying the write_en bitmask.</li>
	<li>A rare case where the the device froze&nbsp;while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance while using the VSC to trigger the send_ring_doorbells.</li>
	<li>An error that prevented the completions (CQ) from being completed due to a race condition in the firmware transport error handlers, and the error stressors, where the error stressors would hang the firmware transport error handler flow.</li>
	<li>An issue that caused the fragmented IP packets to drop was fixed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7ebf7b3b32234babb113c6746f09f68e" version="f62ab96edcaf45bd90a727afcd989a5c" lucid_version="U38.linux@2.42_01-23-2021__sc-linux-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.<p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC+1). This support also requires the latest version of iLO Firmware, version 2.40 or later.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>None<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.<p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.<p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.<p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.<p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers.</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="bf6c1988a6474823969dd84808070288" version="013183a1a8c349be8e048b9ce56a25fc" lucid_version="U40.win.x64@2.42_01-23-2021__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.42_01-23-2021" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated the support for Fast Fault Tolerant Memory Mode (ADDDC) to improve system uptime.</p><p>Added support to the BIOS/Platform Configuration (RBSU) Time Zones to add Dublin/London (UTC 1). This support also requires the latest version of iLO Firmware, version 2.40 or later.</p>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>None<p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception under heavy stress with short loops of instructions. This may result in a machine check exception in Bank 3 with MSCOD = 0080 and MCACOD = 0400h, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). This issue only impacts 2nd generation Intel Xeon Scalable Performance processors. This issue is not unique to HPE servers.</p><p>This revision of the System ROM includes the latest revision of the Intel microcode which provides a fix for a potential machine check exception when high levels of posted interrupt traffic occurs on PCIe. This may result in a machine check exception in Bank 9, 10 or 11 with MSCOD = 000Ch, as logged in the Integrated Management Log (IML). The Intel microcode patches included in this release are versions 0x02006A09 (CPUID 50654), 0x04003005 (CPUID 50656) and 0x05003005 (CPUID 50567). As part of this change, a new BIOS/Platform Configuration (RBSU) option in Advanced Performance Options has been added to allow a customer to disable this mitigation. This issue is not unique to HPE servers.</p><p>Addressed an extremely rare issue where the Real Time Clock may become corrupted on a server boot. This was typically seen as an unexpected change to the RTC Year field but could impact other parts of the Date and Time. This issue is not unique to HPE servers.</p><p>Addressed an issue where the Extended Memory Test is not run when configured in BIOS/Platform Configuration (RBSU) to Enabled.  Note that this option is Disabled by default.  This issue was introduced in the v2.40 revision of the System ROM.</p><p>Addressed an issue where the server system fans may run higher than anticipated when a server is configured with AHCI SATA drives.</p><p>Addressed an issue where a bad LRDIMM memory device could be mapped out but was not properly reported in the Integrated Memory Log (IML). This issue only impacted systems configured with LRDIMMs.</p><p><strong>Known Issues:</strong></p>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.40_10-26-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM to allow for an increased amount of 64-bit Memory Mapped I/O available for third party options cards.  <p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.  <p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This version of the system ROM includes updates to the Intel Memory Reference Code which may help improve memory stability for systems configured with two DIMMs per channel. Please consult Intel sighting documentation for more details on the improvements included in the Intel IPU.2.2020 release. This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-0381. The Intel microcode patches included in this release are version 0x02006A08 (CPUID 50654), 0x04003003 (CPUID 50656) and 0x05003003 (CPUID 50567). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0587, CVE-2020-0588, CVE-2020-0590, CVE-2020-0591, CVE-2020-0592 and CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8739, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which addressed an issue where the system may get stuck in a reboot loop during memory training. This issue was introduced with the v2.30 System ROM. This issue was not unique to HPE servers</p>

<p>Addressed an issue where the memory locality of the ACPI SLIT table was not being created properly. In rare cases, the incorrect ACPI SLIT values could cause unexpected impacts to system performance. This issue was introduced in the v2.10 version of the System ROM and was not seen with previous versions of the System ROM.</p>

<p>Addressed an issue where NVMe Hot-plug and Hot-add would not function properly with VMware. This issue did not impact NVMe Hot-plug or Hot-add with other operating systems.</p>

<p>Addressed an issue where the system would not properly call out a memory replacement event in the Integrated Management Log (IML) if an uncorrected memory failure occurred during an Advanced Double DRAM Device Correction (ADDDC) sparing operation. This fix only impacts the incorrect logging of these events and does not impact the normal operation of the system in terms of causing uncorrected memory failures or causing any change to the operation of A3DC functionality. This issue only impacts systems configured for fast Fault Tolerant Memory Mode (ADDDC).</p>

<p>Addressed an issue where the BIOS/Platform Configuration (RBSU) option for the Extended Memory Test could be automatically disabled after a system reboot. This issue was introduced with the v2.30 System ROM and was not seen with earlier version of the System ROM.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="474dacedc05a47e69c05eb6235e4913d" version="ba114f28fec843b8b356a82b12b2bf2e" lucid_version="MB6000GVYZB_MB4000GVYZA_ESXi@HPG4(E)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="efc60b9bf1a141328e5b2c582be6ef7b" version="8758a32e4f124005a0652bf87381acbb" lucid_version="nicfwupg_intel_bl.linux_x64@1.2.3__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.2.3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 7, Updates 8 and 9.<br />
This product now supports Red Hat Enterprise Linux 8, Updates 2&nbsp;and 3.<br />
This product now supports SUSE Linux Enterprise Server 12 SP5.<br />
This product now supports SUSE Linux Enterprise Server 15 SP2.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.14" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>

<p>&nbsp;</p>

<p>This product now supports the following operatings systems:</p>

<ul>
	<li>Red Hat Enterprise Linux 7 Update 7</li>
	<li>Red Hat Enterprise Linux 8 Update 0</li>
	<li>SUSE Linux Enterprise Server 15 SP1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product addresses an issue where the &quot;Firmware Image Properties,&quot;&nbsp;&quot;Device Level Configuration,&quot;&nbsp;and &quot;Link Speed Status&quot; options in NIC HII menu disappear when F7 is pressed.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="55aaafbf4e5149bd9a06cddaff69d915" version="070071e7593a45f79bc8ecf111983fa1" lucid_version="HPE-CNA-FC-Emulex-Enablement.rhel8.x86_64@12.8.352.11__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="12.8.352.11" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 12.8.352.11</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.6.272.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to version 12.6.272.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="acb1ff6d668a45ae89fbb3be24e50b7f" version="b87c6ca7c45a4c10872f04394156c8ae" lucid_version="MR000240GWFLU_MR000480GWFLV_VR000480GWFMD_MR00_x64@HPGE(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGE" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGE (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="707803ff432e4432b9c2ea604ffe836c" version="c04d500fdc0040b7bb89d21ca4c1a0bc" lucid_version="MK000480GWCEV_MK000960GWCFA_MK001920GWCFB_x64@HPG3(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Error Recovery Optimization Enhancements</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="68f339cee17941e6924c89aa13ccc526" version="9b2351ded5034f2b8c828cc6da56d790" lucid_version="vxs.w2k12_r2@1.2.199.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.2.199.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.131.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a8ea930bfde1449ab4444eb61f65be31" version="9e32b7debcb24a8a9625efaf2d6cb1ce" lucid_version="MLNX_Open_Ethernet_NIC_MFT_FW_package.x64@1.0.0.4__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is&nbsp;updated to 14.29.1016:</strong></p>

<p>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)<br />
P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</p>

<p><strong>Firmware for the following devices is&nbsp;updated to 16.29.1016:</strong></p>

<p>P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)<br />
P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)<br />
P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)</p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<p><strong>New Feature and Changes in Version 14.29.1016 and 16.29.1016:</strong></p>

<ul style="list-style-type:square">
	<li>Ethernet wqe_too_small Mode: A per vPort that counts the number of packets that reached the Ethernet RQ but cannot fit into the WQE due to their large size. Additionally, we added the option to control if such packet will cause &ldquo;CQE with Error&rdquo; or &ldquo;CQE_MOCK&rdquo;.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p style="margin-left:40px">Added support for the following features:</p>

<ul style="list-style-type:square">
	<li>cq_overrun counter: The counter represents the number of times CQs enter an error state due to overflow that occur when the device tries to post a CQE into a full CQ buffer.</li>
	<li>Enabled the capability to allow Virtual Functions to send Pause Frames packets. (Beta)</li>
	<li>Enabled 10/25GbE auto-sensing with 3rd party when using 10/25GbE optical cables.</li>
</ul>

<p><strong>New Feature and Changes in Version 16.29.1016:</strong></p>

<ul style="list-style-type:square">
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>

<p style="margin-left:40px">Added support for the following features:</p>

<ul style="list-style-type:square">
	<li>HW support for Flow Metering to utilize Advanced Steering Operation (ASO).&nbsp;HW Flow Meter allows higher scale, more accuracy, and better performance compare to the FW Flow Metering.</li>
	<li>Trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>2 new Mini CQE formats:</li>
	<li>Responder Mini CQE With Flow Tag Layout.</li>
	<li>Responder Mini CQE With l3_l4_info Layout.</li>
	<li>Steering DP hash flow groups.</li>
	<li>ignore_flow_level is now enabled by the TRUST LEVEL access registry.&nbsp;</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 14.29.1016 and 16.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that caused packets to drop due to header size issues and/or failing checks. This issue was caused due to a Linux issue that caused VFs to set the wrong header size value in wqe_inline_header_mode input.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) might take longer than when MKEY_BY_NAME was disabled.</li>
	<li>In rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
	<li>An issue that caused the device to go to dead IRISC as one of the firmware semaphores could not be released when a speed change or port state change was triggered.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 16.29.1016:</strong></p>

<ul>
	<li>An issue that caused the eth_wqe_too_small counter to count ODP page faults.</li>
	<li>A low performance was observed after enabling the RoCE Accelerator capability.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices is&nbsp;updated to 14.27.4000:</strong></p>

<p>P21930-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4121A-XCAT Adapter)<br />
P11341-B21 (HPE Ethernet 10Gb 2-port SFP+ MCX4621A-ACAB OCP3 Adapter)</p>

<p><strong>Firmware for the following devices is&nbsp;updated to 16.27.2008:</strong></p>

<p>P13188-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX512F-ACAT Adapter)<br />
P21927-B21 (HPE Ethernet 100Gb 2-Port QSFP28 MCX516A-CCHT Adapter)<br />
P10112-B21 (HPE Ethernet 10/25Gb 2-port SFP28 MCX562A-ACAI OCP3 Adapter)</p>

<p><strong>New Feature and Changes in Version 12.27.4000:</strong></p>

<ul>
	<li>Added the following segments, as appeared in the PRM, to the Resource Dump:
	<ul>
		<li>PRM_QUERY_QP</li>
		<li>PRM_QUERY_CQ</li>
		<li>PRM_QUERY_MKEY</li>
		<li>QUERY_VNIC_ENV</li>
	</ul>
	</li>
</ul>

<p><strong>New Feature and Changes in Version 16.27.2008:</strong></p>

<p><strong>This release contains important reliability improvements and security hardening&nbsp;enhancements. Upgrade the&nbsp;firmware of the device to this release to improve the devices&rsquo; firmware&nbsp;security and reliability.</strong></p>

<ul>
	<li>Improved init_hca performance in Parallel Function initialization.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Following issues have been fixed in firmware version 16.27.2008:</strong></p>

<ul>
	<li>Although the effective BER (after FEC) was expected to meet the design&nbsp;targets (e.g. 10e-14 or lower), occasionally it was higher.</li>
	<li>High BER occured when connecting cables of type 0.5/1m DAC to an&nbsp;HDR speed.</li>
	<li>The PCIe Tx parameters did not load correctly when the speed was changed after the PCIe link was disabled.</li>
	<li>The desched_threshold field did not work properly.</li>
	<li>The &quot;roce_adp_retrans&quot; counter was presenting the&nbsp;values of the &quot;local_ack_timeout_err&quot; counter.</li>
	<li>If Relaxed Ordering was&nbsp;disabled by running the &quot;setpci&quot; command, it would not be functional even after re-enabling it by running the &quot;setpci&quot; command again.</li>
</ul>

<p><strong>Following issues have been fixed in firmware version 14.27.4000:</strong></p>

<ul>
	<li>The device hung while running the sw reset flow under heavy stress and with many open resources.</li>
	<li>Low PXE performance observerd while using the VSC to trigger the&nbsp;send_ring_doorbells.</li>
	<li>IPoIB and DC would not work together.</li>
	<li>DC funtionality issues.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b94490ecb4854ca6989ed2491e061c4b" version="24d2af3292a346209305cb8ad90a068a" lucid_version="Apollo_2000_Gen10Plus.Lin@1.27__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.27" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a893ea1028be45a18d3b23d1c1c00c64" version="d416ad114af947d7831757c035a99fb3" lucid_version="EG000300JWBHR_x64@HPD4(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7204c0f5c514445a87ae5a6c742f6a37" version="199c1380a23348df92e3b8a180a4a234" lucid_version="i40e.sles15@2.13.10-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.13.10-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Suse Linux Enterprise Server 15 Service Pack 2</li>
	<li>This product supports new feature called software DCB(Data Center Bridging) which allows using DCB without firmware LLDP(Link Layer Discovery Protocol) agent being turned on.</li>
	<li>This product supports new feature which allows user to specify VLAN(Virtual Local Area Network) field and add it to flow director via ethtool</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses an issue where server hungs after loading XDP(eXpress Data Path) program in case of LLDP(Link Layer Discovery Protocol) agent disabled&nbsp;</li>
	<li>This product addresses an issue where it is not possible to change MAC(Media Access Control) address on VF(Virtual Function) from VM(Virtual Machine) when VF is in trusted mode</li>
	<li>This product addresses an issue where it cannot create VF(Virtual Function) VLAN(Virtual Local Area Network) interface inside a namespace&nbsp;</li>
	<li>This product addresses an issue where system crash during removing driver when VSI(VIrtual Station Interface) is in reset recovery mode</li>
	<li>This product addresses an issue where VF(Virtual Function) receives unicast packets from other VF</li>
	<li>This product addresses an issue where using Intel nvmupdate utility never ending update</li>
	<li>Thips product addresses an issue where kernel crash in vf driver(iavf) reset when pf driver(i40e) is removing</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.11.27-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</li>
	<li>This product corrects an issue which querying DCB configuration data failed on Intel Carslville controller if driver probe or set &nbsp;at 2.5/5G speed.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8d2bd99747b540d2a364efef8e58a91c" version="523b8eb282404350b8cb2426c220088c" lucid_version="nicfwpkg_bcme@218.0.166000__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="218.0.166000" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial version</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses a modification on help string of Family Firmware Version.</li>
	<li>This product addresses an enhancement on LLDP functional option naming under RBSU and the interactivity of DCB protocol option.</li>
	<li>This product addresses an issue about lack of MAC address while querying via RedFish.</li>
	<li>This product addresses an issue about failing to recognize the adapter firmware version under Microsoft Windows(R).</li>
	<li>This product addresses an issue for receiving PCIe errors while installing SUSE Linux Enterprise Server.</li>
	<li>This product addresses an issue for packets missing when UDP multicast application is started/stopped.</li>
	<li>This product addresses an issue for HPE Ethernet 10/25Gb 2-port 631FLR-SFP28 Adapter not linking up during POST.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="d8869737bfef407fbb159aff392990e1" version="508d96363da141d680c0c40ce3402ecc" lucid_version="Shenandoah_sas.rhel8.x86_64.rpm@07.716.02.00-rev2__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="07.716.02.00" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial Release</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="07.716.02.00" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Initial build</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="161a304825cb434e83dc121e59667140" version="39c33a1b6177441dab7920f0232b6bdd" lucid_version="esxi6.5-utilities-sw-bundle-sc@2021.04.02__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.02" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Pickup latest SIGNED hpssacli.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.12.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Includes an updated the Smart Storage Administrator CLI&nbsp;(SSACLI).</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="3a33d0d2b6ca440681703cda5e638a33" version="dcfa3d0fa65042e5b08b49755a129c57" lucid_version="VK000240GWEZB_VK000480GWEZC_VK000960GWEZD_VK0_ESXi@HPGE(F)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPGE" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPGE (E)" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="25bee0f636714c0e8bface2301234fec" version="504a9c7f1e354acab91ba4e7f72387fd" lucid_version="MLNX_VPI_CX6_HCA_MFT_FW_package.x64@1.0.0.3__sc-windows_en"/>
      <revision_history>
        <revision>
          <version value="1.0.0.3" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 20.29.1016:</strong></p>

<p>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21<br />
&nbsp;</p>

<p><strong>New Features and Changes in Version 20.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.</li>
	<li>To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.</li>
	<li>Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.</li>
	<li>Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.29.1016:</strong></p>

<ol>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
</ol>

<ol start="7">
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ol>

<ul>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0.2" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 20.27.6008:</strong></p>

<p>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21<br />
&nbsp;</p>

<p><strong>New Features and Changes in Version 20.27.6008:</strong></p>

<ul>
	<li>The following are the minimal software/firmware versions that support PAM4 link speeds when&nbsp;connected using Mellanox NIC to Mellanox Switch and Mellanox NIC to 3rd Party Switches:
	<ul>
		<li>Mellanox Onyx: 3.9.0830-038</li>
		<li>ConnectX-6: 20.27.2008*<br />
		*Note: NICs with this firmware version support Mellanox-to-Mellanox connectivity with PAM4 link&nbsp;speeds.</li>
	</ul>
	</li>
	<li>Added support for the following features:
	<ul>
		<li>Enabled KP4RS FEC on Active Fiber cable up to 30m.</li>
		<li>FDR protocol.</li>
		<li>Enabled updating End-to-End (E2E) credit packets instantly.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>There are no new fixes in firmware version 20.27.6008.</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="30f1903e29c9444e8763652af6b41477" version="7daec0f74d024ffc917804c41ba8db47" lucid_version="ixgbevf.rhel8@4.9.3-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9.3-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>This product now supports Red Hat Enterprise Linux 8 update 2 and Red Hat Enterprise Linux 8 update 3</li>
	<li>This product enhances reliability via adding support for new mailbox communication between PF(Physical Function) and VF(Virtual Function) and remove its potential flaws that may lead to the undefined or faulty behavior</li>
	<li>This product enhances compatibility where new mailbox api implementation is alo compatible with old drivers</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.7.1-1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product update Linux kernel documentation and Configure IRQ affinity tools</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which errata kernel loads inbox driver instead of this component after booting into OS</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="6439c3485f63410da139047f5f5bc562" version="cc43930523c74752b1e37147bbf2243e" lucid_version="esxi70-ilo-drv-bundle-sc@2021.04.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Supports VMware ESXi 7.0 U1 and ESXi 7.0 U2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Supports ESXi 7.0 and ESXi 7.0 U1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f9f0f575f0ee448d89b3c55f9e30c251" version="060a997cbeb24642af4c2668607fd1a8" lucid_version="amsd_rhel7@2.4.1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.4.1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This release contains the following enhancements:</p>

<ul>
	<li>Enhance the robust communication with iLO. The enhancement has a proper process exist and OS signal handling.</li>
	<li>Enhance the SMA logging system for better recording of the communication events.</li>
	<li>The AMSD reports the Open NIC controllers SN to align with iLO for avoiding the un-sync information.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following items:</p>

<ul>
	<li>Addressed a small amount of memory leak as outlined in the Customer Advisory,&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&amp;docId=a00053824en_us">a00053824en_us</a></li>
	<li>A customer may experience where smad may periodically report: No response from iLO for Hello.&nbsp; After losing connection with iLO, the subagent may experience&nbsp;high CPU utilization for trying the reconnection. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us</a>.&nbsp;</li>
	<li>The cpqIde service not able to start while the AMSD configuration is agent mode.</li>
	<li>Addressed&nbsp;buffer overflow issues in select&nbsp;corner cases.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.3.1" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following item:</p>

<ul>
	<li>A customer may experience where smad may periodically report: No response from iLO for Hello.&nbsp; After losing connection with iLO, the subagent may experience&nbsp;high CPU utilization for trying the reconnection. This issue is documented in Customer Advisory&nbsp;<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00111063en_us</a>.&nbsp; Customers experiencing this issue are requested to update to amsd version 2.3.1.&nbsp;&nbsp;</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="70f19ffffee546149605e6df93bd9de3" version="0ce26dd3cd4744ca9f29d5a742fa7ceb" lucid_version="be2iscsi.w2k16@12.0.1171.0(C)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1171.0" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="text-align:left">This product now supports the following network adapters:</p>

<ul style="list-style-type:square">
	<li>HP FlexFabric 10Gb 2-port 556FLR-T Adapter</li>
	<li>HP FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.0.1171.0 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2a24f9ce00084650b7c1f83427a4e25f" version="a02261c5a06247f6856decd2852f7b4c" lucid_version="MK000480GWSSC_MK000960GWSSD_MK001920GWSSE_x64@HPG3(B)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul style="list-style-type:square">
	<li>PrefetchClear logic error on Write CMD.</li>
	<li>ICRC Data Integrity improvement.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ccd2fccdbff94b0ab75d085d46522784" version="26463067cde141168363c49d5447a0c1" lucid_version="emulex.fc.fw.lin.x64_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">This Firmware package contains following firmware versions:</p>

<p>&nbsp;</p>

<table border="1" cellpadding="1" cellspacing="1" dir="LTR" style="width:935px">
	<tbody>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Adapter</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Speed</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Universal Boot Image</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Firmware</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>UEFI</strong></p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR"><strong>Boot Bios</strong></p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 81E 8Gb Single Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 82E 8Gb Dual Port PCIe Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE 84E 8Gb Quad Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">8Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.80a3</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">2.10X6</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.183.0</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.9.0</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1000E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1000E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1100E Quad Port 16Gb Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1200E 16Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1200E 16Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">16Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1600E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1600E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1610E 32Gb Single Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
		<tr>
			<td style="vertical-align:middle">
			<p dir="LTR">HPE SN1610E 32Gb Dual Port Fibre Channel Host Bus Adapter</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">32Gb</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.12</p>
			</td>
			<td style="vertical-align:middle">
			<p dir="LTR">12.8.352.10</p>
			</td>
			<td style="vertical-align:top">
			<p dir="LTR">12.8.352.5</p>
			</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">We&nbsp; have separate components to update fibre channel and converged network adapters.&nbsp;This is a fibre channel&nbsp;update component.</p>

<p><strong>Contains:</strong></p>

<p>&nbsp;</p>

<p>32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>16/32 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>16 Gb universal boot 12.6.275.12(EFI 12.6.275.7 BOOT BIOS 12.6.271.0 Firmware 12.6.275.12)</p>

<p>8 Gb HBA Standup firmware 2.10X6<br />
8 Gb standup universal boot image 12.60a4(12.6.302.0 BIOS, 12.6.284.0 UEFI)</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0b3bbfed90454334ba3331c2f9efa2ea" version="c7013c08f08a4e3995b6ce9f08a8cc44" lucid_version="VO000960JWZJF_VO001920JWZJH_VO003840JWZJK_ESXi@HPD4__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Modify Drive Vendor Identification String (VID) in Inquiry page from &ldquo;HP&rdquo; to &ldquo;HPE&rdquo;.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD3" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Increased Queue Size from 32 to 128 to be equal to the max number of chips.</li>
	<li>Refresh NM SRAM area periodically only when idle as a possible work around on NM SRAM parity error.</li>
	<li>Change the error response as 0x3 (SP_Busy) or 0x07 ( NO_SESSION_AVAILABLE) when host attempts to open another session while a session is already opened.</li>
	<li>Disable verify compare if APP_CHK=0.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="45de3d94e74d43a1ad4f5b8b01de0092" version="80676a7ea3f24dfe983233cfea632a09" lucid_version="hpdsa.rhel7.x86_64.rpm@1.2.10-184__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="1.2.10-184" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Red Hat Enterprise Linux 7 Update 9</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.2.10-179" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Add support for Red Hat Enterprise Linux 7 Update 8</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="08ec266b2d2d49f5bd28c75479361f16" version="8bc8caf473734efca692527d8ac54b6e" lucid_version="MLNX_VPI_CX6_HCA_MFT_FW_package.esxi65@1.0.1__sc-linux-fw_en"/>
      <revision_history>
        <revision>
          <version value="1.0.1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 20.29.1016:</strong></p>

<p>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21<br />
&nbsp;</p>

<p><strong>New Features and Changes in Version 20.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.</li>
	<li>To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.</li>
	<li>Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.</li>
	<li>Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.29.1016:</strong></p>

<ul>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.0" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>Firmware for the following devices are updated to 20.27.6008:</strong></p>

<p>HPE InfiniBand HDR/Ethernet 200Gb 1-port 940QSFP56 x16 Adapter - P06154-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 1-port 940QSFP56 x16 Adapter - P06250-B21<br />
HPE InfiniBand HDR100/Ethernet 100Gb 2-port 940QSFP56 x16 Adapter - P06251-B21<br />
&nbsp;</p>

<p><strong>New Features and Changes in Version 20.27.6008:</strong></p>

<ul>
	<li>The following are the minimal software/firmware versions that support PAM4 link speeds when&nbsp;connected using Mellanox NIC to Mellanox Switch and Mellanox NIC to 3rd Party Switches:
	<ul>
		<li>Mellanox Onyx: 3.9.0830-038</li>
		<li>ConnectX-6: 20.27.2008*<br />
		*Note: NICs with this firmware version support Mellanox-to-Mellanox connectivity with PAM4 link&nbsp;speeds.</li>
	</ul>
	</li>
	<li>Added support for the following features:
	<ul>
		<li>Enabled KP4RS FEC on Active Fiber cable up to 30m.</li>
		<li>FDR protocol.</li>
		<li>Enabled updating End-to-End (E2E) credit packets instantly.</li>
	</ul>
	</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>There are no new fixes in firmware version 20.27.6008.</strong></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="21c2460d0eda43ee8d9561eb3baf6bcd" version="1a0991d8a5624f7d9ebc33a33dcc65aa" lucid_version="MB010000JWAYK_MB008000JWAYH_x64@HPD5(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.  </li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="408f4a25d4b44e79916ac17904fc2648" version="be8dc6678c024860b819cd47cd51bd6a" lucid_version="mlnx_en_roce.rhel7u9.x86_64.rpm@4.9__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.9" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>The following changes and new features are added in version 4.9:</strong></p>

<ul>
	<li><strong>For ConnectX-5 Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Option to dump configuration space via the devlink tool in order to improve debug capabilities.</li>
	<li>The conventional TX descriptor (WQE or Work Queue Element) describes a single packet for transmission. Added driver support for the HW feature of multi-packet TX WQEs in XDP transmit flows. With this, the HW becomes capable of working with a new and improved WQE layout that describes several packets. In effect, this feature saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>GENEVE encapsulation/decapsulation rules offload.</li>
	<li>Driver support for the hardware feature of multi-packet Tx to work with a new and improved WQE layout that describes several packets instead of a single packet for XDP transmission flows. This saves PCI bandwidth and transactions, and improves transmit packet rate.</li>
	<li>Updating CT (Connection Tracking) rules using the software steering mechanism.</li>
	<li>Updating remote mirroring rules using the software steering mechanism.<br />
	&nbsp;</li>
	<li><strong>For ConnectX-4&nbsp;Adapters and above</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Exposed rx_prio[p]_discards discard counters per priority that count the number of received packets dropped due to lack of buffers on the physical port.</li>
	<li>Reporting TSO and CSUM offload capabilities for MPLS tagged traffic and, allowed the kernel stack to use these offloads.</li>
	<li>mlx5e Max Combined Channels Increased the driver&rsquo;s maximal combined channels value from 64 to 128 (however, note that OOB value will not cross 64). 128 is the upper bound. Lower maximal value can be seen on the host, depending on the number of cores and MSIX&#39;s configured by the firmware.</li>
	<li>Added the following RoCE accelerator counters:
	<ul>
		<li>roce_adp_retrans - counts the number of adaptive retransmissions for RoCE traffic.</li>
		<li>roce_adp_retrans_to - counts the number of times RoCE traffic reached timeout due to adaptive retransmission.</li>
		<li>roce_slow_restart - counts the number of times RoCE slow restart was used.</li>
		<li>roce_slow_restart_cnps - counts the number of times RoCE slow restart generated CNP packets roce_slow_restart_trans - counts the number of times RoCE slow restart changed state to slow restart.</li>
	</ul>
	</li>
	<li>User to register memory regions with a relaxed ordering access flag through experimental verbs. This can enhance performance, depending on architecture and scenario.<br />
	&nbsp;</li>
	<li><strong>For&nbsp;All HCA&#39;s</strong></li>
</ul>

<p><strong>Added support for the following features:</strong></p>

<ul>
	<li>Output ibdev2netdev tool output was changed such that the bonding device now points at the bond instead of the slave interface.</li>
	<li>Monitoring and recovering from errors that occur on the RX queue, such as cookie errors and timeout.</li>
	<li>Improved GSO (Generic Segmentation Offload) workload performance by decreasing doorbells usage to the minimum required.</li>
	<li>TX CQE (Completion Queue Element) compression. Saves on outgoing PCIe bandwidth by compressing CQEs together. Disabled by default. Configurable via private flags of ethtool.</li>
	<li>Firmware Versions Query via Devlink :Added the option to query for running and stored firmware versions using the devlink tool.</li>
	<li>Firmware Flash Update via Devlink :Added the option to update the firmware image in the flash using the devlink tool. Usage: devlink dev flash file .mfa2 For further information on how to perform this update, see &quot;Updating Firmware Using ethtool/devlink and .mfa2 File&quot; section in MFT User Manual.</li>
	<li>WQE (Work Queue Element) dump, triggered by an error on Rx/Tx reporters. In addition, some dumps (not triggered by an error) can be retrieved by the user via devlink health reporters.</li>
	<li>GENEVE tunneled hardware offloads of TSO, CSUM and RSS.</li>
	<li>TCP segmentation and checksum offload support for MPLS-tagged traffic.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 4.9:</strong></p>

<ul>
	<li>An issue where injecting EEH (Extended Error Handlng) may cause extra Kernel prints, such as: &ldquo;EEH: Might be infinite loop in mlx5_core driver&rdquo; was fixed.</li>
	<li>RPM-based OSs with non-default kernels, using repositories after re-creating the installer (using --add-kernel-support) were&nbsp;resulting&nbsp;in improper installation of the drivers.</li>
	<li>A typo in perftest package where help messages wrongly displayed the conversion result between Gb/s and MB/s (20^2 instead of 2^20).</li>
	<li>When one of the LAG slaves went down, LAG deactivation failed, ultimately causing bandwidth degradation.</li>
	<li>The mlx5 driver maintains a subdirectory for every open eth port in /sys/kernel/debug/. For the default network namespace, the sub-directory name is the name of the interface, like &quot;eth8&quot;. The new convention for the network interfaces moved to the non-default network namespaces is the interfaces name followed by &quot;@&quot; and the port&#39;s PCI ID. For example: &quot;eth8@0000:af:00.3&quot;.</li>
	<li>&quot;openibd&quot; script load used to fail when esp6_offload module did not load successfully.</li>
	<li>Added dependency of package mpi-selectors on perl-Getopt-Long system package. On minimal installs of RPM-based OSs, installing mpi-selectros will also install the required system package perl-Getopt-Long.</li>
	<li>During certain rare scenarios, due to Rx page not being replenished, the same page fragment mistakenly became assigned to two different Rx descriptors.</li>
	<li>Driver load issue existed with Errata-kernel on SLES15 SP1.</li>
	<li>An issue in the Hairpin feature which prevented adding hairpin flows using TC tool was fixed.</li>
	<li>WQ (Work Queue)&nbsp;queue flushing was not handled properly in the event of EEH.</li>
	<li>A rare kernel crash scenario when exiting an application that uses RMPP mads intensively.</li>
	<li>A possible kernel crash scenario when AER/slot reset in done in parallel to user space commands execution.</li>
	<li>Added missing ECN (Explicit Congestion Notification) configuration under sysfs for PFs in SwitchDev mode.</li>
	<li>When firmware response time to commands became very long, some commands failed upon timeout. The driver may have then triggered a timeout completion on the wrong entry, leading to a NULL pointer call trace.</li>
	<li>Added driver support for kernels with the old XDP_REDIRECT infrastructure that uses the following NetDev operations: .ndo_xdp_flush and .ndo_xdp_xmit.</li>
	<li>Usage of --excludedocs Open MPI RPM option resulted in the removal of non-documentation related files.</li>
	<li>Disabled automated loading of some modules through udev triggers to preserve the startup process of previous MLNX_OFED versions.</li>
	<li>Reference count (refcount) for RDMA connection ID (cm_id) was not incremented in rdma_resolve_addr() function, resulting in a cm_id use-after-free access. A fix was applied to increment the cm_id refcount</li>
	<li>A race condition which caused kernel panic when moving two ports to SwitchDev mode at the same time.</li>
	<li>Allowed accessing sysfs hardware counters in SwitchDev mode</li>
	<li>Function smp_processor_id() is called in the RX page recycle flow to determine the core to run on. This is intended to run in NAPI context. However, due to a bug in backporting, the RX page recycle was mistakenly called also in the RQ close flow when not needed.</li>
	<li>Port link state was automatically changed (without admin state involvement) to &quot;UP&quot; after reboot.</li>
	<li>ConnectX-3 adapter cards froze when running over SLES 11 OS.</li>
	<li>RDMA CM (Remote Direct Memory Access Communation Manager) connection failed when port space was small.</li>
	<li>Traffic mirroring with OVS (Open VSwitch)offload and non-offload over VxLAN interface is now supported. Note: For kernel 4.9, make sure to use a dedicated OVS version.</li>
	<li>When working with VF LAG while the bond device is in active-active mode, running fwreset would result in unequal traffic on both PFs, and PFs would not reach line rate.</li>
	<li>When bond was created over VF (Virtuaal Function)&nbsp;netdevices in SwitchDev mode, the VF netdevice would be treated as representor netdevice. This caused the mlx5_core driver to crash in case it received netdevice events related to bond device.</li>
	<li>An issue where following a bad affinity occurrence in VF LAG mode, traffic was sent after the port went up/down in the switch.</li>
	<li>Added support for VLAN (Virtual Local Area Network)&nbsp;header rewrite on CentOS 7.2 OS.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="99585b9bf89c4f4eb41d039eef8811c2" version="cacefc2d3dc3479fafb26a7c8438c4f5" lucid_version="mlnxcx3.w2k16@5.35.12978.0(D)__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="5.35.12978.0" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now remove&nbsp;supports Synergy and Blade&nbsp;Server.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="5.35.12978.0 (C)" revision="C" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product restores support for the following network adapters:</p>

<ul>
	<li>HP Ethernet 10G 2-port 546FLR-SFP+ Adapter</li>
	<li>HP Ethernet 10G 2-port 546SFP+ Adapter</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="04dc2cf5b5cc44668cfd3459661fd5db" version="c62d019301f54441acbfc0bbde4e210f" lucid_version="vxn_bl.w2k12r2@1.2.199.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.2.199.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product is updated to maintain compatibility with updated Windows installation libraries, vxnmsg.dll, nicco5.dll, and nicinvxn.dll.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.0.16.1" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c5181c3bc0654e9db312aa6200639426" version="443e094424f24bc6a65a9be721424bd9" lucid_version="U44.win.x64@2.20_10-27-2020-rev1__sc-windows-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.20_10-27-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>Addressed an issue where the &quot;Minimum Processor Idle Power Package C-State&quot; RBSU option was missing.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.20_10-27-2020" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[Added a new BIOS/Platform Configuration (RBSU) option to Memory Options called Refresh Watermarks. When selecting the Low Watermark setting, the memory controller will help reduce susceptibility to a DDR4 RowHammer attack. It is expected that a memory performance impact will be seen when enabling the Low Watermark setting. The default operation of the system has not changed and customers wanting to provide additional RowHammer protection should enable this setting.  <p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.<p>Updated the System ROM support for One Button Secure Erase functionality with the latest HPE option devices.<p>Updated the RESTful API HPE BIOS Attribute Registry resources to match the latest BIOS/Platform Configuration options.]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<P><B>Important Notes:</B></P>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.<P><B>Firmware Dependencies:</B></P>None<P><B>Problems Fixed:</B></P>This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigations for security vulnerabilities documented as CVE-2020-8696, CVE-2020-8694 and CVE-2020-8695. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00381 and INTEL-SA-00389. The Intel microcode patches included in this release are version 0x000000DE (CPUIDs 906ED, 906EC, 906EB and 906EA). These issues are not unique to HPE servers.<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0593. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358.  These issues are not unique to HPE servers.<P><B>Known Issues:</B></P>None]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="33a82ad709014bf88daa4d5451b9b3d6" version="581d8f4184c948aa9adf50bdd6c11888" lucid_version="EH0300JEDHC_EH0450JEDHD_EH0600JEDHE_x64@HPD4(H)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="fc0a79d6952d41d4919e3578b5303d5a" version="5241556771f44c028d2e15279f1a1bdc" lucid_version="MB4000JEFNC_MB6000JEFND_x64@HPD9(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7cbddfc3ba97405ea0a71d3635caace8" version="5c6778e4dc0b44fa959c2b15e80b1463" lucid_version="mlnx_mft.rhel7u9.x86_64.rpm@4.16__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="4.16" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="4.15" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>MFT prerequisite RPMs for Mellanox adapter firmware update in Secure Boot mode.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="191698dcecb7439eb6e537a0877ed0e1" version="a6915b77f1284ff488472fe13fc5de03" lucid_version="P220i_P222_P420i_P420_P421_P721m_Gen9.Esxi@8.32(E)__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="8.32" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for ESXi 7.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="8.32 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for ESXi 7.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f08c2998f0194b1483b2e21050a3b5a3" version="50b74377044c4844af9358215b794000" lucid_version="MB6000GEBTP_ESXi@HPG4(H)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG4" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG4 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4e575045dc6d4bff9cf8a8d6613b0cd4" version="035a461dc93142d6a01389a8448efa17" lucid_version="ql_iscsiuio.rhel8u0@2.11.5.13-3__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="2.11.5.13-3" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>TBD</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="f620be56e3714dd58684aa99e9723c4b" version="146ac5e072ca46f6b866f700dba59b3a" lucid_version="MB6000GVYYU_x64@HPG2(G)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b013dc662ea446dbabf5ade1d9cf8d6f" version="27b266f0612947b18f051b09f7249a6b" lucid_version="EG1800JFHMH_ESXi@HPD7(G)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (F)" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b59071ade4f9427093d3054145f8756e" version="f6958296a88d45ea87f64a0f531f8a89" lucid_version="Apollo_2000_Gen10.Lin@1.00(B)-rev1__sc-linux-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.00" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SUSE Linux Enterprise Server 15 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.00 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for SUSE Linux Enterprise Server 15 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="7004592a3bf74fab99a6fe756662ebbc" version="0ab6707015ec485bbf88e7376ad6b187" lucid_version="VO000960JWTBK_VO001920JWTBL_VO003840JWTBN_ESXi@HPD7(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD7" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD7 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="89a2a097a7fc4af6987e0d04ef00de6a" version="141e6e7c72144a15a6805876d9b696b2" lucid_version="Shenandoah_Storcli.ESXi@2021.04__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Support for maintaining, monitoring and configuring MegaRAID Gen10+ Controllers: MR416i-a, MR416i-p, MR216i-a, MR216i-p</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="63f9bb70bcb94f2c9378d569ebb38b7e" version="b3ac0e1a44b6453b9379469977b4ec9e" lucid_version="MB2000GFEMH_MB4000GFEMK_ESXi@HPG6(H)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG6" revision="H" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location. This issue was found during supplier ongoing reliability testing.</li>
	<li>
	<p>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</p>
	</li>
	<li>
	<p>Online firmware update fails when drives are connected behind AHCI controller.</p>
	</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG6 (G)" revision="G" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>Corrects a potential data integrity issue caused by an in process write retry incorrectly starting at the wrong location.Â  This issue was found during supplier ongoing reliability testing.</li>
	<li>
	<p>The firmware also corrects settings preservation after a code download, and includes emergency power off improvements.</p>
	</li>
	<li>
	<p>Online firmware update fails when drives are connected behind AHCI controller.</p>
	</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1bfd9c2e979e4c999fa2978061e8b412" version="5f68d7d834124fa2bb667b093a5289fe" lucid_version="MB4000JEXYA_MB6000JEXYB_ESXi@HPD9(E)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD9" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD9 (D)" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="a970944cf8a44d27bcff8a800d52aa6b" version="4605a3d3ebb84d00bcacc344d0ff81bf" lucid_version="qla2xxx.rhel8.x86_64@10.02.01.00.a14-k1__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.01.00.a14-k1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 10.02.01.00.a14-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.01.00.64.08.0-k1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial driver for RedHat Enterprise Linux Server&nbsp;8 update 2 version&nbsp;10.01.00.64.08.0-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cbfe1835cecf43e391be405d2fc118ca" version="fb25419d7aab4c0abf1a0a6f1a35810c" lucid_version="i40en.vmware67@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue obtain PCI addresses information when execution intnet CLI tools.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.14" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue which PCI device information passing to intnetcli Command-Line Interface (Intel&reg; ESXCLI Plug-In Managing tool ).</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="1d0e9b382f8640e89092917ac97996ce" version="7860b153a7d24baf989a922306bac235" lucid_version="MB6000JEQUV_MB8000JEQVA_ESXi@HPDB(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPDB" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPDB (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0a5c3792d04d4b22a3b657bedf5eaefc" version="5e77a2ef1f9c4110bdef59afe945ae29" lucid_version="qla2xxx.driver.esxi67.zip_rt@2021.02.01__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 3.1.46.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Driver version 3.1.36.0</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="44342a3601e1466c9e7b89e65ba92f03" version="525bf62de5ab4cb8aa743703a25072cd" lucid_version="emulex_fcoe_x64.w2k19_bl@12.0.1192.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.0.1192.0" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p style="margin-left:0in; margin-right:0in">Added support for following:</p>

<p>Updated to driver version 12.0.1192.0</p>

<p>Removed the raw driver file folder.&nbsp; The raw driver files can be obtained by extracting the Smart Component and then extracting the Emulex installer.&nbsp; Use this command:<br />
<br />
&nbsp;&nbsp;&nbsp; brcmdrvr-fcoe-version.exe /q2 extract=2<br />
<br />
The extracted files are located:<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version<br />
<br />
Each kit folder has subsequent architecture folders with subsequent OS folders.&nbsp; For example,<br />
<br />
&nbsp;&nbsp;&nbsp; C:\Users\Administrator\Documents\Broadcom\Drivers\FCoE-version\x64\win2012</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="58002f5fbb3c4bdca0598c03bb921813" version="78dbc7efc2d84846ad51a0aab8e97e31" lucid_version="MB010000JWAYK_MB008000JWAYH_ESXi@HPD5(F)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="F" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands. This issue was only found in supplier ongoing lab testing.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (E)" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.Â  This issue was only found in supplier ongoing lab testing.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="b1381f6ec67b40269898593ac27aca95" version="1cf079f4c1b648dd889a1e178a193b88" lucid_version="MB004000JWWQB_MB002000JWWQA_MB001000JWWPV_ESXi@HPD4(B)__sc-linux-fw_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD4" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD4" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update includes a fix that prevents unrecoverable read errors in highly localized write intensive workload, and a new servo code revision that improves performance under specific vibration conditions.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="933e42b273b146ee8ce7b3d90a74c2b2" version="3bac55d05c7246759fedb7acd77fb04c" lucid_version="qla2xxx.sles12.x86_64@10.02.01.00.a14-k1__pubsw-linux_en,ja"/>
      <revision_history>
        <revision>
          <version value="10.02.01.00.a14-k1" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated to driver version 10.02.01.00.a14-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="10.01.00.64.12.5-k1" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Updated driver for:</p>

<p>SuSE Linux Enterprise Server 12 service pack&nbsp;5 (SLES12 sp5) version 10.01.00.64.12.5-k1</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0d44f7068b8b4ccebd15e4e19fe5c5fa" version="145f218c38594cffbc95a1aa3f156b70" lucid_version="MO000400JWFWN_MO000800JWFWP_MO001600JWFWQ_x64@HPD5(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8f00f37b744a48c992007d0537ca5fe1" version="9fc97ed54c974096acd65b849ed7c1a9" lucid_version="LO0400KEFJQ_LO0800KEFJR_LO1600KEFJT_LO2000KEFJ_x64@HPK4(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="2131145ed95b459da9bb06449e0c1401" version="af007ed6060b482b92cee7b2f45ba59c" lucid_version="intel_pvl.w2k16@12.16.3.1__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="12.16.3.1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product contains Windows system update supported improvements.&nbsp;</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="12.15.184.7" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="070f2ccb66ec4478ba85a2e3d9712434" version="2336d9615387402b8fabd13a221023ec" lucid_version="EH000900JWCPN_EH000600JWCPL_EH000300JWCPK_ESXi@HPD6(B)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD6" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD6" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This update improves performance for random read workloads with delays between reads.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cca7377cd12644cab41f5bd7e94cc2bd" version="153ac93d8b554afa839dff52fe01ac49" lucid_version="FWPKG-P23665-B21@20.29.1016__fwpkg-generic_en"/>
      <revision_history>
        <revision>
          <version value="20.29.1016" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p><strong>New Features and Changes in Version 20.29.1016:</strong></p>

<p>Added support for following features:</p>

<ul>
	<li>LinkX module burning via MFT toolset. The new capability enables direct firmware burning from the internal flash storage to reduce the bandwidth and accelerate the burning process, including burning several modules at a time.</li>
	<li>An option to allow applications to build their own QoS tree over the NIC hierarchy by connecting QPs to responder/requestor Queue Groups.</li>
	<li>Improved NRZ link performance (RX algorithm).</li>
	<li>Improved NRZ link-up time (25G\50G\100G speeds).</li>
	<li>Enabled the options to control different Tx sets for the same attribute when connecting a Mellanox-Mellanox vs Mellanox to 3rd party HCA.</li>
	<li>&quot;InfiniBand&quot; properties set to the Network Device Function Redfish object.</li>
	<li>Direct Packet Placement (DPP): DPP is a receive side transport service in which the Ethernet packets are scattered to the memory according to a packet sequence number (PSN) carried by the packet, and not by their arrival order.</li>
	<li>To enable DPP offload, the software should create a special RQ by using the CREATE_RQ command, and set DPP relevant attributes.</li>
	<li>Added trust level for VFs. Once the VF is trusted, it will get a set of trusted capabilities.</li>
	<li>UCX can now enable AR by exposing Out-Of-Ordering bitmask per SL with &quot;ooo_per_sl&quot; field in the HCA_VPORT context. It can be also queried by running the QUERY_HCA_VPORT_CONTEXT command.</li>
	<li>Enhanced IB Congestion Control to support lower minimum rate. Now it uses destination-lid to classify flows to handle larger scale, and achieve better results in GPCNeT benchmark.</li>
	<li>Hardware steering dump output used for debugging and troubleshooting.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>The following issues have been fixed in version 20.29.1016:</strong></p>

<ol>
	<li>Changed the default value of DCQCN&#39;s (Data center- Quantized Congestion Notification) NP parameter min_time_between_cnps to 4 on all devices to support larger scalability of cluster.</li>
	<li>An issue that prevented VXLAN packets with svlan/cvlan tag from being matched.</li>
	<li>The eth_wqe_too_small counter to count ODP (On-Demand Paging) page used to fail.</li>
	<li>An issue related to raising 100GbE link on ConnectX-6 VPI 100Gb/s adapter cards.</li>
	<li>When MKEY_BY_NAME was enabled by NVCONFIG and a large number of VFs are configured, VM restart (VF/PF FLR) will take longer than when MKEY_BY_NAME is disabled.</li>
	<li>Low performance occurred after enabling the RoCE Accelerator capability.</li>
	<li>On rare cases, a fatal error related to errors from the PCI transport layer might be reported during FLR.</li>
</ol>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="606295772f834fc984488410e9459b3e" version="80e442ed055b4cf2a7cd9796d4efab1c" lucid_version="MB002000GWFGH_MB001000GWFGF_x64@HPG3(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG3" revision="F" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG3 (E)" revision="E" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="466714784bac4803a010a4a944178d10" version="597ef8fdd0c9438da8f7c1eb7edfbc73" lucid_version="Apollo_Gen10_45xx.Win@1.56(C)__sc-windows-fw-array_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="1.56" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added HPE Smart Array p824i-p controller support</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.56 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Microsoft Windows Server 2019 OS</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4a7b934c55fe47768eb7c9f45376dbee" version="2a19e992cf664481a0959883b298c7e4" lucid_version="evbd_bl.win64@7.13.196.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="7.13.196.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now provides non-SRIOV NIC switch and UDP hash support for Windows Server 2016.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects a Windows Stop Error (BSOD) seen when uninstalling the NDIS driver.<br />
This product corrects a BSOD with error code 7E seen when a system is heavily loaded with network traffic.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.13.171.0 (D)" revision="D" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now privately supports Windows 10.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="0099c8dbd23e4805b57e681e858e79b9" version="a446d1edc1154e7490e374e4878243a0" lucid_version="EG1800JEMDB_x64@HPD5(F)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="F" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (E)" revision="E" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="96853662d13b4def814a5c153a747271" version="e6ec9820b4854fc7a4ab64066689ac57" lucid_version="MB004000JWKGU_x64@HPD1(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD1" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD1 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4db7819f5f294e828ed2663d73c4bc75" version="ad377dec54a74be9a64df62a6fb23369" lucid_version="broadcom_nxe.w2k16@218.0.32.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="218.0.32.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product correct an issue where an system are freeze and reboot when system recovering after non-fatal error.</li>
	<li>This product correct an issue which fixes VF will not load on certain Virtual OS when Windows is host OS.&nbsp;</li>
	<li>This product correct an issue which fixes user mode RDMA blue screen of death (BSoD) caused by an IRP SystemBuffer access race condition</li>
	<li>This product corrects a Windows Stop Error blue screen of death (BSoD) seen when uninstalling the NDIS driver</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="216.0.143.3" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="408cc9357d7a4fdb8b6243b952746726" version="674cfbdff576400c9578c177df218836" lucid_version="intel_i40ea.w2k16@1.13.104.0__sc-windows_en,ja"/>
      <revision_history>
        <revision>
          <version value="1.13.104.0" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an traffic packets making cert failure seen when packets transferred to VLAN after RDMA function enabled.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="1.12.177.0" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Initial release.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="cc4bfdeb5e654d1bb1a491db23bb09b4" version="cc1e1edd585648c0adab7dce36affd66" lucid_version="qedentv.vmware65@2021.04.05__component-vmware_en"/>
      <revision_history>
        <revision>
          <version value="2021.04.05" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue runs out of MSI-X interrupt vectors caused what Purple Screen of Death (PSOD)</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.14" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue where Fibre Channel over Ethernet (FCoE) frame with CRC size and End Of Frame(EOF) size.</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="8dacb77af98a4fc9af98892b534614a5" version="224867b02856423e999e6dc25548f5e8" lucid_version="U21.vmware@2.80_10-16-2020__sc-vmware-uefi-sys_en"/>
      <revision_history>
        <revision>
          <version value="2.80_10-16-2020" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support to BIOS/Platform Configuration (RBSU) to allow importing and exporting Secure Boot signature lists as a signed binary file. This is useful to import the Microsoft revocation list binary file into the Secure Boot DBX as found on the UEFI forum at https://uefi.org/revocationlistfile.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>This version of the System ROM contains updates aligned with the Intel Product Update (IPU) version IPU.2020.2 guidance.</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest revision of Intel microcode. The Intel microcode patches included in this release are versions 0x00000044 (CPUID 306F2) and 0x00B00003A (CPUID 406F1).</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS advisories and security vulnerabilities documented as CVE-2020-0591 and CVE-2020-0592. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00358. These issues are not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code which provides mitigations for BIOS platform code advisories and security vulnerabilities documented as CVE-2020-8738, CVE-2020-8740, and CVE-2020-8764. These security vulnerabilities are documented in Intel Security Advisory INTEL-SA-00390. These issues are not unique to HPE servers.</p>

<p>This version of the System ROM contains an updated UEFI Driver for the SmartArray B140i SATA RAID controller. This update addresses an issue where the system may periodically experience an operating system boot issue such as experiencing a Linux kernel panic on boot.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2.76_10-21-2019" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p><strong>Important Notes:</strong></p>

<p>None</p>

<p><strong>Firmware Dependencies:</strong></p>

<p>None</p>

<p><strong>Problems Fixed:</strong></p>

<p>This revision of the System ROM includes the latest support for Intel Trusted eXecution Technology (TXT) which provides mitigation for CVE-2019-151. This mitigation is only needed for systems that have TXT enabled&nbsp;(TXT is disabled by default). This issue is not unique to HPE servers.</p>

<p>This revision of the System ROM includes the latest revision of the Intel Reference Code support that provides mitigation for CVE-2019-11137. This issue is not unique to HPE servers.</p>

<p><strong>Known Issues:</strong></p>

<p>None</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4b93b2211c95475cbce045b32636c34c" version="d8e352da11b34e0d80f8e264d15d3576" lucid_version="EG0300FCSPH_EG0450FCSPK_EG0600FCSPL_EG0900FCS_ESXi@HPD2(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD2" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0 U1</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD2 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for VMware 7.0</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="4f66ba55022c4d27b6cbd8baecfe7d6d" version="a796c1afb8264186b90e79e967a69a40" lucid_version="hpsa.rhel8.x86_64.rpm@3.4.20-203__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="3.4.20-203" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for Red Hat Enterprise Linux 8.3</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="3.4.20-196" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>Added support for Red Hat Enterprise Linux 8.2</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="c65e02b4990e43eea4fa2402b45960eb" version="08f233ba77d145f5a543911423652281" lucid_version="MB008000GWWQU_MB006000GWWQT_x64@HPG2(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for Windows Server 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>&nbsp;Added support for Windows 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="9f8f92dcaee7444992d11c0fa284d349" version="e36b80191aea4f34bad8a4bd36c8d3c9" lucid_version="netxtreme2.rhel8@7.14.76-1__pubsw-linux_en"/>
      <revision_history>
        <revision>
          <version value="7.14.76-1" revision="" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p>This product now supports Red Hat Enterprise Linux 8, Updates 2&nbsp;and 3.</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>This product corrects an issue obtain Medium Dependent Interface(MDI) and Medium Dependent Interface Crossover (MDIX) information when execution ethtool tools</p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="7.14.70-1 (B)" revision="B" type_of_change="0"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part/>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This product addresses an issue where the driver Precision Time Protocol (PTP) is not working due to timestamp problem.</li>
	<li>This product addresses an issue where the Firmware installation failure when enabling secure boot under SUSE Linux Enterprise Server 15 SP2.</li>
</ul>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="91d189194b084bd98d6e01e6c3e2ba6d" version="491835f2059e495bb053fdb25f751726" lucid_version="emulex.cna.fw.esxi67_rt@2021.02.01__sc-linux-fw-sys_en"/>
      <revision_history>
        <revision>
          <version value="2021.02.01" revision="" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">Updated CNA (XE100 series) firmware</p>

<table border="1" cellpadding="1" cellspacing="1" style="width:800px">
	<tbody>
		<tr>
			<td>Adapter</td>
			<td>Speed</td>
			<td>Firmware</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 10Gb 2-port 556FLR-T Adapter</td>
			<td>10Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE FlexFabric 10Gb 2-port 556FLR-SFP+ Adapter</td>
			<td>10Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE CN1200E Dual Port Converged Network Adapter</td>
			<td>20Gb</td>
			<td>12.0.1336.0</td>
		</tr>
		<tr>
			<td>HPE&nbsp;CN1200E-T Dual Port Adapter</td>
			<td>20Gb</td>
			<td>12.0.1336.0</td>
		</tr>
	</tbody>
</table>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="2020.09.01 (b)" revision="b" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<p dir="LTR">Updated CNA (XE100 series) firmware</p>

<p dir="LTR"><strong>Firmware</strong></p>

<p><strong>Contains:</strong></p>

<p>CNA (XE100 series) firmware 12.0.1280.5</p>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<p>Fixed the following:</p>

<p>UEFI:</p>

<ul>
	<li>HPE FlexFabric 20Gb 2-port 650FLB Adapter and HPE FlexFabric 20Gb 2-port 650M Adapter&nbsp;does not complete&nbsp;to create boot source on 2nd port</li>
</ul>

<p>Firmware:</p>

<ul>
	<li>Light Emiiting Diode(LED) is in&nbsp;invalid state when disable the port under Unified Extensible Firmware Interface (UEFI)</li>
	<li>Duplicate Entries found in firmware report under NIC details for few adaptors.</li>
	<li>Full adapter name is not displayed for HPE FlexFabric 20Gb 2-port 650M Adapter&nbsp;in some Rom Based Setup Utility (RBSU).</li>
	<li>On any HPE ProLiant server configured with the HPE Emulex XE-102 Based network adapter HPE FlexFabric 10Gb 2-port 556FLR-T Adapter with CNA (XE100 series) firmware 12.0.1110.0, 12.0.1110.10, or 12.0.1110.11 (or later), the network adapters may experience a &quot;link down&quot; state that is not recoverable by a power-cycle or reset.</li>
</ul>

<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;For more details please go through the document titled &quot;HPE ProLiant Servers Configured With Certain HPE Emulex XE-102 Based Network Adapters May Experience Link Down Due To a Firmware Issue&quot; at the following link:<a href="https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us" rel="noreferrer noopener" tabindex="-1" target="_blank" title="https://support.hpe.com/hpesc/public/docdisplay?docid=emr_na-a00099050en_us">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00099050en_us</a></p>
]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ff74c7c5dcd8491d9c1177c5c1de73f4" version="74248605ae304cc9ba33ce9cfa233734" lucid_version="MB6000GVYYU_x64@HPG2(H)__sc-linux-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="H" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.3</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (G)" revision="G" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for RHEL 8.2</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="ed9a4b98eb61471ab66480b22d4e9c4f" version="8a52fb0b0bab4387bb5c535a30a62090" lucid_version="MB014000GWRTN_MB012000GWRTL_MB010000GWRTK_x64@HPG2(D)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPG2" revision="D" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPG2 (C)" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="e4254455513a49c0ad5f61c79ab13950" version="064f9174dc2b4c889878bce61029814f" lucid_version="MB010000JWAYK_MB008000JWAYH_x64@HPD5(E)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPD5" revision="E" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPD5 (D)" revision="D" type_of_change="2"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows Server 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part><![CDATA[<ul>
	<li>This code corrects a potential data integrity issue related to unaligned write commands.This issue was only found in supplier ongoing lab testing.</li>
</ul>]]></revision_fixes_xlate_part>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
    <product_version>
      <id product="537734d235b44d80ac3623e8cb9c5d5b" version="1e080cae2b134740afaa658dbcc913b0" lucid_version="VS000480KWDUP_VS000960KWDUQ_MS000400KWDUR_x64@HPK4(C)__sc-windows-fw-drive_de,en,es,fr,it,ja"/>
      <revision_history>
        <revision>
          <version value="HPK4" revision="C" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
        <revision>
          <version value="HPK4 (B)" revision="B" type_of_change="1"/>
          <revision_enhancements_xlate lang="en">
            <revision_enhancements_xlate_part><![CDATA[<ul>
	<li>Added support for Windows 2019.</li>
</ul>
]]></revision_enhancements_xlate_part>
          </revision_enhancements_xlate>
          <revision_fixes_xlate lang="en">
            <revision_fixes_xlate_part/>
          </revision_fixes_xlate>
        </revision>
      </revision_history>
    </product_version>
  </revision_history>
</manifest>
