Hp Proliant Ml110 G7 Linux Install Software

Prerequisites:The 'HPE ProLiant iLO 3/4 Channel Interface Driver” (CHIF) for Linux which is integrated into the standard Linux kernel.To ensure the integrity of your download, HPE recommends verifying your results withthis SHA-256 Checksum value: f02b4ea305f7e7167e10d25f15df371eaa124491f67c708bbf5872b60d2f7897RPMS/i386/firmware-system-j01-2018.02.22-1.1.i386.rpmReboot Requirement:Reboot is required after installation for updates to take effect and hardware stability to be maintained.Installation:IMPORTANT: This component will fail if it is unable to communicate with iLO. This can occur if HPE ProLiant Agentless Management Service ( AMS) and HPE SNMP Agents ( SNMP Agents) are both running. HPE does not recommend running AMS and the SNMP Agents at the same time. End User License Agreements:Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important:Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation. Additional information is available from Intel’s Security Exploit Newsroom,.Deliverable Name:HP ProLiant ML110 G7 and DL120 G7 System ROM - J01Release Version:Last Recommended or Critical Revision:Previous Revision:Firmware Dependencies:NoneEnhancements/New Features:NoneProblems Fixed:Updated the Intel processor microcode to the latest version.Known Issues:None. Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre.

How to install Linux Ubuntu server 16.04 with software RAID 1. From USB boot to install linux ubuntu operating system on a hp proliant dl360p g8. HP Proliant Ml110 GEN 9 initial.

Kubota L3350 Operators Manual When this Kubota Equipment was new, the dealer would have given you the Operator Manual for your Tractor. Also known as the owners, user, or care and operation manual, this 64 page manual is a faithful reproduction of the factory written original. Kubota l3350 tractor operators manual.

The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation. Additional information is available from Intel’s Security Exploit Newsroom,.Firmware Dependencies:NoneProblems Fixed:Updated the Intel processor microcode to the latest version.Known Issues:None.

Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation. Additional information is available from Intel’s Security Exploit Newsroom,.Deliverable Name:HP ProLiant ML110 G7 and DL120 G7 System ROM - J01Release Version:Last Recommended or Critical Revision:Previous Revision:Firmware Dependencies:NoneEnhancements/New Features:NoneProblems Fixed:Updated the Intel processor microcode to the latest version.Known Issues:None.

Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and/or hypervisor updates, provides mitigation for a new group of side channel vulnerabilities known as Microarchitectural Data Sampling (MDS). This includes support for mitigating the following vulnerabilities: CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling, and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory.

These issues are not unique to HPE servers.Firmware Dependencies:NoneProblems Fixed:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and/or hypervisor updates, provides mitigation for a new group of side channel vulnerabilities known as Microarchitectural Data Sampling (MDS). This includes support for mitigating the following vulnerabilities: CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling, and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory. These issues are not unique to HPE servers.Known Issues:None(2 Jul 2018). Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities. These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis. These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors. Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability.

A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.Firmware Dependencies:NoneProblems Fixed:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities.

These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis. These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors.

Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis.

This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.Known Issues:NoneVersion:2018.02.22 (16 Mar 2018). Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation. Additional information is available from Intel’s Security Exploit Newsroom,.Firmware Dependencies:NoneProblems Fixed:Updated the Intel processor microcode to the latest version.Known Issues:None(24 Oct 2016).

Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important Notes:Ver. 2013.07.01 (B) contains updates to the component packaging and is functionally equivalent to ver. It is not necessary to upgrade with Revision B if a previous component Revision was used to upgrade the system ROM to version 2013.07.01.Firmware Dependencies:NoneProblems Fixed:Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above.

This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.Known Issues:None(14 Aug 2013).

Upgrade Requirement:Critical - HP requires users update to this version immediately.Important Notes:NoneFirmware Dependencies:NoneProblems Fixed:Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode.

This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.Known Issues:None(4 Jan 2013). Important Notes:NoneFirmware Dependencies:NoneProblems Fixed:Resolved a processor issue where certain instructions and conditions could result in an application-level error, blue screen, kernel panic, or other unpredictable system behavior.

This issue affects platforms utilizing Intel Xeon E3-series processors. This issue is not unique to HP ProLiant servers and could impact any system using affected processors. This revision of the System ROM contains an updated version of Intel’s microcode for affected processors that addresses this issue.Resolved an issue where disabling the serial port in the ROM-Based Setup Utility (RBSU) would cause Windows Device Manager to show a yellow exclamation point for the serial port.Resolved an issue where the system may experience a Red Screen Illegal Op Code when the embedded SATA Controller has been disabled from the ROM Based Setup Utility (RBSU.)Known Issues:None(4 Jun 2012). Upgrade Requirement:Recommended - HPE recommends users update to this version at their earliest convenience.Important Notes:NoneFirmware Dependencies:NoneProblems Fixed:Updated processor microcode to the latest version released from Intel.

This microcode addresses an Intel erratum which addresses a potential issue where the use of the VMASKMOV instruction to access memory mapped I/O or uncached memory may cause the server to stop responding or become unstable.Addressed an issue when using PXELinux to boot to the local hard drive instead of the network drive that can result in a Red Screen Illegal Opcode.Addressed an issue where the embedded video controller card would remain disabled if a stand-up video controller was installed and set as the primary controller and then removed. This issue resulted in no video being displayed.Addressed an extremely rare issue where the USB keyboard would sometimes stop functioning when being used in a pre-boot environment such as system boot or the ROM-Based Setup Utility (RBSU).Addressed an issue where certain USB drive keys were returning the wrong size when accessed in a pre-boot environment such as system boot or the ROM-Based Setup Utility (RBSU).Addressed an issue where larger size USB Drive Keys (16GB or larger) may not function properly in pre-boot environments such as system boot or the ROM-Based Setup Utility (RBSU). This issue does not affect the operation of USB devices under an Operating System.Addressed an issue where removing a USB hub with connected USB devices during pre-boot environments such as system boot or the ROM-Based Setup Utility (RBSU) will cause the server to stop responding.Removed Memory Interleaving and Node Interleaving memory options from the ROM Based Setup Utility (RBSU) because they are not applicable to this server.Known Issues:None. Added support for Collaborative Power Control. This feature, when using an operating system that supports this functionality (such as Windows Server 2008 Release 2), provides improved power management when HP Power Regulator is configured for HP Dynamic Power Savings Mode by allowing the operating system and platform firmware to work together to provide optimum control of processor frequency for improved power efficiency.

This functionality has no impact on system operation if using an operating system that does not support this feature or if HP Power Regulator is not configured for HP Dynamic Power Savings Mode. The Collaborative Power Control selection in the Advanced Power Management Options of the ROM-Based Setup Utility (RBSU) provides the capability to disable this feature. Only operating systems that support the Processor Clocking Control (PCC) interface allow for Collaborative Power Control.Added support that allows a system with two USB Drive Keys attached to boot from the second key if the first key is not bootable. Previous revisions of the System ROM would only attempt to boot one USB Drive Key.(13 May 2011). Prerequisites:The 'HPE ProLiant iLO 3/4 Channel Interface Driver” (CHIF) for Linux which is integrated into the standard Linux kernel.To ensure the integrity of your download, HPE recommends verifying your results withthis SHA-256 Checksum value: f02b4ea305f7e7167e10d25f15df371eaa124491f67c708bbf5872b60d2f7897RPMS/i386/firmware-system-j01-2018.02.22-1.1.i386.rpmReboot Requirement:Reboot is required after installation for updates to take effect and hardware stability to be maintained.Installation:IMPORTANT: This component will fail if it is unable to communicate with iLO.

This can occur if HPE ProLiant Agentless Management Service ( AMS) and HPE SNMP Agents ( SNMP Agents) are both running. HPE does not recommend running AMS and the SNMP Agents at the same time. End User License Agreements:Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important:Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre.

Marvell support. We also use third-party cookies that help us analyze and understand how you use this website. You also have the option to opt-out of these cookies. These cookies will be stored in your browser only with your consent.

The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation. Additional information is available from Intel’s Security Exploit Newsroom,.Deliverable Name:HP ProLiant ML110 G7 and DL120 G7 System ROM - J01Release Version:Last Recommended or Critical Revision:Previous Revision:Firmware Dependencies:NoneEnhancements/New Features:NoneProblems Fixed:Updated the Intel processor microcode to the latest version.Known Issues:NoneFixes. Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation. Additional information is available from Intel’s Security Exploit Newsroom,.Firmware Dependencies:NoneProblems Fixed:Updated the Intel processor microcode to the latest version.Known Issues:None Important.

Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation. Additional information is available from Intel’s Security Exploit Newsroom,.Deliverable Name:HP ProLiant ML110 G7 and DL120 G7 System ROM - J01Release Version:Last Recommended or Critical Revision:Previous Revision:Firmware Dependencies:NoneEnhancements/New Features:NoneProblems Fixed:Updated the Intel processor microcode to the latest version.Known Issues:None Revision History. Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and/or hypervisor updates, provides mitigation for a new group of side channel vulnerabilities known as Microarchitectural Data Sampling (MDS). This includes support for mitigating the following vulnerabilities: CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling, and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory. These issues are not unique to HPE servers.Firmware Dependencies:NoneProblems Fixed:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and/or hypervisor updates, provides mitigation for a new group of side channel vulnerabilities known as Microarchitectural Data Sampling (MDS).

This includes support for mitigating the following vulnerabilities: CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling, and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory. These issues are not unique to HPE servers.Known Issues:NoneVersion:2018.05.21 (2 Jul 2018).

Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities. These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis. These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors. Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability.

A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.Firmware Dependencies:NoneProblems Fixed:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities. These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis. These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors. Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639.

Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability.

A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.Known Issues:NoneVersion:2018.02.22 (16 Mar 2018). Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important Notes:This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.

Additional information is available from Intel’s Security Exploit Newsroom,.Firmware Dependencies:NoneProblems Fixed:Updated the Intel processor microcode to the latest version.Known Issues:NoneVersion:2013.07.01 (B) (24 Oct 2016). Upgrade Requirement:Critical - HPE requires users update to this version immediately.Important Notes:Ver. 2013.07.01 (B) contains updates to the component packaging and is functionally equivalent to ver. It is not necessary to upgrade with Revision B if a previous component Revision was used to upgrade the system ROM to version 2013.07.01.Firmware Dependencies:NoneProblems Fixed:Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior.

While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.Known Issues:NoneVersion:2013.07.01 (14 Aug 2013). Upgrade Requirement:Critical - HP requires users update to this version immediately.Important Notes:NoneFirmware Dependencies:NoneProblems Fixed:Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode.

This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue.

Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.Known Issues:NoneVersion:2012.12.04 (4 Jan 2013). Important Notes:NoneFirmware Dependencies:NoneProblems Fixed:Resolved a processor issue where certain instructions and conditions could result in an application-level error, blue screen, kernel panic, or other unpredictable system behavior. This issue affects platforms utilizing Intel Xeon E3-series processors. This issue is not unique to HP ProLiant servers and could impact any system using affected processors.

This revision of the System ROM contains an updated version of Intel’s microcode for affected processors that addresses this issue.Resolved an issue where disabling the serial port in the ROM-Based Setup Utility (RBSU) would cause Windows Device Manager to show a yellow exclamation point for the serial port.Resolved an issue where the system may experience a Red Screen Illegal Op Code when the embedded SATA Controller has been disabled from the ROM Based Setup Utility (RBSU.)Known Issues:NoneVersion:2012.02.01 (4 Jun 2012). Upgrade Requirement:Recommended - HPE recommends users update to this version at their earliest convenience.Important Notes:NoneFirmware Dependencies:NoneProblems Fixed:Updated processor microcode to the latest version released from Intel.

This microcode addresses an Intel erratum which addresses a potential issue where the use of the VMASKMOV instruction to access memory mapped I/O or uncached memory may cause the server to stop responding or become unstable.Addressed an issue when using PXELinux to boot to the local hard drive instead of the network drive that can result in a Red Screen Illegal Opcode.Addressed an issue where the embedded video controller card would remain disabled if a stand-up video controller was installed and set as the primary controller and then removed. This issue resulted in no video being displayed.Addressed an extremely rare issue where the USB keyboard would sometimes stop functioning when being used in a pre-boot environment such as system boot or the ROM-Based Setup Utility (RBSU).Addressed an issue where certain USB drive keys were returning the wrong size when accessed in a pre-boot environment such as system boot or the ROM-Based Setup Utility (RBSU).Addressed an issue where larger size USB Drive Keys (16GB or larger) may not function properly in pre-boot environments such as system boot or the ROM-Based Setup Utility (RBSU). This issue does not affect the operation of USB devices under an Operating System.Addressed an issue where removing a USB hub with connected USB devices during pre-boot environments such as system boot or the ROM-Based Setup Utility (RBSU) will cause the server to stop responding.Removed Memory Interleaving and Node Interleaving memory options from the ROM Based Setup Utility (RBSU) because they are not applicable to this server.Known Issues:None. Added support for Collaborative Power Control. This feature, when using an operating system that supports this functionality (such as Windows Server 2008 Release 2), provides improved power management when HP Power Regulator is configured for HP Dynamic Power Savings Mode by allowing the operating system and platform firmware to work together to provide optimum control of processor frequency for improved power efficiency. This functionality has no impact on system operation if using an operating system that does not support this feature or if HP Power Regulator is not configured for HP Dynamic Power Savings Mode. The Collaborative Power Control selection in the Advanced Power Management Options of the ROM-Based Setup Utility (RBSU) provides the capability to disable this feature.

Only operating systems that support the Processor Clocking Control (PCC) interface allow for Collaborative Power Control.Added support that allows a system with two USB Drive Keys attached to boot from the second key if the first key is not bootable. Previous revisions of the System ROM would only attempt to boot one USB Drive Key.Version:2011.04.21 (13 May 2011).

Related Post