{"Bundles":[{"AllowVibSigBypass":"false","AvailabilityNotes":[],"BundleXML":"bp008448.xml","Category":[{"Lang":"en","Value":"Software - Support Pack"},{"Lang":"ja","Value":"ソフトウェア - Support Pack"},{"Lang":"cn","Value":"软件 - 支持包"}],"Contents":[{"Name":"firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1_arm64.deb","ProductId":"4eb19d4bacd949c58b5259eefcdc43ba","VersionId":"fc5e000cdb5f4f50bf79c719ed913f8e"},{"Name":"sut-6.5.0-13_arm64.deb","ProductId":"6a248162d70b41cdb21bb1eb920815e7","VersionId":"3ba386e843e9498cb590a82fcddd5548"},{"Name":"firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1.aarch64.rpm","ProductId":"76dddb8160694dcd97b82196c77c25e0","VersionId":"56db8aa839c84368bc1081eb471c3459"},{"Name":"firmware-hdd-399ac3ba76-0HPK6-1.1_arm64.deb","ProductId":"b002929c00884d0e9531c069bb252f8b","VersionId":"c8e0a5af1b7d4f41a51a916b35263876"},{"Name":"firmware-hdd-5adaf7ae6f-0HPK4-1.1_arm64.deb","ProductId":"fb74539dba324e6c8e7e3e407ff07773","VersionId":"ee3cf54c854d43de9e8a3596a582b95d"},{"Name":"firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1.aarch64.rpm","ProductId":"3def138602444d29bec350a2ccf276bf","VersionId":"45a052b4f6fa4035b1e3e7676b8408b8"},{"Name":"firmware-hdd-1b87ca8270-0HPK2-1.1_arm64.deb","ProductId":"73237dcf4c294040afe9d21c1a39bbf6","VersionId":"cc23f83dde2f404698c30592d79ddfc4"},{"Name":"R11_1.80_01_09_2026_scp_2.10.20240201_appended_binded.fwpkg","ProductId":"4742f9d3cc464355ba3857b16f5bb333","VersionId":"d75eae6d76dc46cfb1abc1421100d05a"},{"Name":"firmware-hdd-1b87ca8270-HPK2-1.1.aarch64.rpm","ProductId":"9f0c779b2d5a4a10a44b4fa809e1b8f3","VersionId":"ab34bade16974cd2b0cf062f7f53a393"},{"Name":"firmware-hdd-4b748c8174-HPK2-1.1.aarch64.rpm","ProductId":"04317d41c98c4b50aa219893021f0ae4","VersionId":"ddfbae88fbdd42d4a25a5e5b42e5b57c"},{"Name":"firmware-hdd-951aefd63e-MPK7825Q-1.1.aarch64.rpm","ProductId":"5ab238d3f20c4e118b6d9d89e3b9a687","VersionId":"1a10359b40a9492eab19fc5c24e3bb35"},{"Name":"amsd-4.5.0-2120.2.sles16.aarch64.rpm","ProductId":"849ccbfec2f64038869f4afbe2ecef3d","VersionId":"628dd583e62449b38363bfc028b88532"},{"Name":"HPE_UBM4_1.24_G.fwpkg","ProductId":"1e88e3b27b814bcdbc8dcf6390d324d1","VersionId":"4e14138c4c714237bcc8bfb333533ccd"},{"Name":"firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1_arm64.deb","ProductId":"9d7ab7e1a0864ae492695c93cf6cc33f","VersionId":"db5fbf351daa4c8787ab06ffefc145b2"},{"Name":"firmware-hdd-48624e387b-0HPK8-1.1_arm64.deb","ProductId":"97e906834cab4ba1a782cd801a68f13e","VersionId":"f027463e4b3545dba38e1b27c694a2a9"},{"Name":"firmware-hdd-03eeb5f134-HPK4-1.1.aarch64.rpm","ProductId":"0f94591dabb6464d99018351342dc4f4","VersionId":"2db7f8123a3e4394bd8564ab19b304ef"},{"Name":"firmware-hdd-52215d9185-0HPK3-1.1_arm64.deb","ProductId":"237b5ef4fc4d43f7aeff9d6a4e428973","VersionId":"1ef773fafa694d21b2ee2e6a310ffd62"},{"Name":"firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1.aarch64.rpm","ProductId":"1a5a8816744647e1adc4c7f37f0024e1","VersionId":"7e43662a20e64cf298533ba031da2d4f"},{"Name":"firmware-hdd-52215d9185-HPK3-1.1.aarch64.rpm","ProductId":"8b4188fdc6af4b38af0e648893f8fe63","VersionId":"6b9c66664a16453d9f2571b3da667fcc"},{"Name":"firmware-hdd-48624e387b-HPK8-1.1.aarch64.rpm","ProductId":"269c16a027cf4615b11236eebd3bee15","VersionId":"93f261d175344785b1dbc6cdbc93dc01"},{"Name":"ilo6_174.fwpkg","ProductId":"994a0b6ce04a44b9b4daabf9aed11e4c","VersionId":"a6410be47a614fd79c5f9e558b05a19c"},{"Name":"amsd-4.5.0-2120.1.rhel10.aarch64.rpm","ProductId":"0fd5447fb09a42599ddbf0e58cd0e2e8","VersionId":"8652ce93105f425ca1a769448143a318"},{"Name":"firmware-hdd-f20279bc06-0HPK6-1.1_arm64.deb","ProductId":"d2883a50aa3b46a799d64ea3a77f96a2","VersionId":"bdc8bac4e2564640bc6466049a16d0bf"},{"Name":"firmware-hdd-2ba844ae8c-HPK4-1.1.aarch64.rpm","ProductId":"dfeda317932a458eb967353b53eff149","VersionId":"eaa58df9987b48bba0c434cfa873cc03"},{"Name":"amsd_4.5.0-2120.4-ubuntu24_arm64.deb","ProductId":"0f71cf6c5c9740e08647e121d410d3e4","VersionId":"9b66524c2381493c9e596b0b3e4da4e7"},{"Name":"firmware-hdd-03eeb5f134-0HPK4-1.1_arm64.deb","ProductId":"744889f2dcd049f28bb74e4262d11276","VersionId":"0cf2787df17b434383533b4572065074"},{"Name":"amsd_4.5.0-2120.2-ubuntu22_arm64.deb","ProductId":"e8927123b15f4b749e7264389a03efcf","VersionId":"8c8c1a5f0f0d423490af485ec19b502e"},{"Name":"firmware-hdd-a27c95663d-0HPK6-1.1_arm64.deb","ProductId":"e316b66b271b47fc80ca7f43b1a1a853","VersionId":"303c8108748f40878f16217b3baa891a"},{"Name":"firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1_arm64.deb","ProductId":"2cea1aa2095a4bf8996d2ce3b06a524f","VersionId":"8908febd139045bebd5ad71fdd9dc647"},{"Name":"firmware-hdd-44d456ce65-HPK7-1.1.aarch64.rpm","ProductId":"1d4ec3582de648c5a0415a5960a70552","VersionId":"ab2025105b4b4e5ca86e1dd4b14a253c"},{"Name":"HPE_UBM6_1.06_A.fwpkg","ProductId":"923bb6bba3254a6d80257c1bf056f39d","VersionId":"7b7e1b259798400e9d831a9ae7dc63e5"},{"Name":"firmware-hdd-399ac3ba76-HPK6-1.1.aarch64.rpm","ProductId":"db5d7ecf159645df89170658bd9673cb","VersionId":"57f6cbcbb2e34131b30d3804149dd923"},{"Name":"firmware-hdd-44d456ce65-0HPK7-1.1_arm64.deb","ProductId":"5fd6973f399648b5a19a88b5145387e6","VersionId":"e5a09e901db048ed8df17d7b5a75aae2"},{"Name":"sut-6.5.0-38.linux.aarch64.rpm","ProductId":"603fa5d97b1142a18f1bf257431b07a5","VersionId":"77ad31a265cf4da1ae89bd6c8d89b33f"},{"Name":"firmware-hdd-a27c95663d-HPK6-1.1.aarch64.rpm","ProductId":"ecec706965b04c0d93b1cd8a95470b7c","VersionId":"ea5095bc20e044d0a817ff02b62e8fea"},{"Name":"firmware-hdd-5adaf7ae6f-HPK4-1.1.aarch64.rpm","ProductId":"a6a2f5a871c449f7b8239daa1afec71c","VersionId":"c581bece26754183b03cf3f3f57548c2"},{"Name":"amsd-4.5.0-2120.1.rhel9.aarch64.rpm","ProductId":"4e6efe09c32f45c293caefe372d45bde","VersionId":"c2a523d1576f417289d84ef20109a108"},{"Name":"R13_1.30_02_05_2026.fwpkg","ProductId":"a5747f530b554b468913296ae995623a","VersionId":"f6393f8acadd4935b600f3aa0b979322"},{"Name":"firmware-hdd-f20279bc06-HPK6-1.1.aarch64.rpm","ProductId":"857ac986dfec440b80025c47d900893b","VersionId":"c0432a513f4741bf8b523f7ef060537e"},{"Name":"firmware-hdd-4b748c8174-0HPK2-1.1_arm64.deb","ProductId":"bdc739b220714869adac43ec886dbaac","VersionId":"c34e03afe0fc45a997f1d59aeb19b61a"},{"Name":"firmware-hdd-951aefd63e-0MPK7825Q-1.1_arm64.deb","ProductId":"8c02e06159ce40b292d3b2a200010701","VersionId":"c2bc3e7d224847efb5ea881a320de8ea"},{"Name":"firmware-hdd-2ba844ae8c-0HPK4-1.1_arm64.deb","ProductId":"2b379144fd3f4e8f9ae738e221692d85","VersionId":"f77c443adebe46e9b693fab548cd528f"},{"Name":"amsd-4.5.0-2120.2.sles15.aarch64.rpm","ProductId":"f2ad814ee9344547a02f34046e80f6f4","VersionId":"6082847bdfe944b1ab2478158945818a"},{"Name":"HPE_UBM5_1.16_A.fwpkg","ProductId":"6ca442c991c749709fbf69d8d57a3358","VersionId":"ec125a04c65848c09f2ceb45d6aa89b6"}],"Description":[{"Lang":"en","Value":"AIP (Advanced Integrated Pack) is a common package including software and firmware components supporting HPE ProLiant Compute DL384 Gen12 Server and HPE ProLiant RL300 Gen11 Server."},{"Lang":"ja","Value":"AIP (Advanced Integrated Pack) is a common package including software and firmware components supporting HPE ProLiant Compute DL384 Gen12 Server and HPE ProLiant RL300 Gen11 Server."},{"Lang":"cn","Value":"AIP (Advanced Integrated Pack) is a common package including software and firmware components supporting HPE ProLiant Compute DL384 Gen12 Server and HPE ProLiant RL300 Gen11 Server."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"DocumentationNotes":[{"Lang":"en","Value":"<p>Advanced Integrated Pack includes support for HPE ProLiant Compute DL384 Gen12 Server and HPE ProLiant RL300 Gen11 Server.</p>"},{"Lang":"ja","Value":"<p>Advanced Integrated Packには、HPE ProLiant Compute DL384 Gen12サーバーおよびHPE ProLiant RL300 Gen11サーバーのサポートが含まれています。</p>"},{"Lang":"cn","Value":"<p>Advanced Integrated Pack includes support for HPE ProLiant Compute DL384 Gen12 Server and HPE ProLiant RL300 Gen11 Server.</p>"}],"Id":{"Product":"b625bd5da21741ba9d132d9081df5943","Version":"d4d429162b08419aa80d49b722ed3f23"},"InstallationNotes":[{"Lang":"en","Value":"<p>Please refer &lsquo;Installing components&rsquo; section in the release notes for details.</p>"},{"Lang":"ja","Value":"<p>詳細については、リリースノートの「コンポーネントのインストール」セクションを参照してください。</p>"},{"Lang":"cn","Value":"<p>Please refer &lsquo;Installing components&rsquo; section in the release notes for details.</p>"}],"LangList":[{"Lang":"en","Value":"English (US),Japanese,Chinese (Simplified)"},{"Lang":"ja","Value":"英語（US）,日本語,中国語（簡体）"},{"Lang":"cn","Value":"英语（美国）,日语,简体中文"}],"Name":[{"Lang":"en","Value":"Advanced Integrated Pack for ARM platform"},{"Lang":"ja","Value":"ARMプラットフォーム向けAdvanced Integrated Pack"},{"Lang":"cn","Value":"Advanced Integrated Pack for ARM platform"}],"PrerequisiteNotes":[],"Prerequisites":{"SupportedOperatingSystems":[{"Id":"5","Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Id":"6","Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Id":"1","Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"},{"Id":"4","Major":"16","Minor":"0","Name":"SUSE Linux Enterprise Server 16 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Id":"3","Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS ARM","Platform":"ubuntu2404","Sr":"OEM"},{"Id":"2","Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS ARM","Platform":"ubuntu2204","Sr":"OEM"}]},"ProductSupportedOperatingSystems":[{"Family":"R13","SupportedOperatingSystemIDs":["5","6","1","4","3","2"]},{"Family":"R11","SupportedOperatingSystemIDs":["5","6","1","4","3","2"]}],"ReleaseDate":{"Day":"02","Hours":"12","Minutes":"06","Month":"03","Seconds":"46","Year":"2026"},"RevisionHistory":{"ReleaseNotes":[{"Enhancements":"<ul><li>Added components for the&nbsp;HPE&nbsp;ProLiant Compute DL384 Gen12 Server</li><li>RL component pack repository migrated to advanced integrated pack repository</li></ul><p>&nbsp;</p><p>Note: The advanced integrated pack repository supersedes the RLCP repository. The RLCP repository is now deprecated. HPE encourages you to update your system from the advanced integrated pack repository.</p>","Fixes":"","Lang":"en"},{"Enhancements":"<ul><li>HPE ProLiant Compute DL384 Gen12サーバーのコンポーネントが追加されました</li><li>RLコンポーネントパックレポジトリはAdvanced Integrated Packレポジトリに移行されました</li></ul><p> </p><p>注記：Advanced Integrated PackレポジトリはRLCPレポジトリに優先します。RLCPレポジトリは非推奨になりました。HPEでは、Advanced Integrated Packレポジトリからシステムをアップデートすることをお勧めします。</p>","Fixes":"","Lang":"ja"},{"Enhancements":"<ul><li>Added components for the&nbsp;HPE&nbsp;ProLiant Compute DL384 Gen12 Server</li><li>RL component pack repository migrated to advanced integrated pack repository</li></ul><p>&nbsp;</p><p>Note: The advanced integrated pack repository supersedes the RLCP repository. The RLCP repository is now deprecated. HPE encourages you to update your system from the advanced integrated pack repository.</p>","Fixes":"","Lang":"cn"}],"Version":"2026.02.00.00"},"SPPGeneration":["AIP"],"SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"Version":{"Revision":"","TypeOfChange":"1","Value":"2026.02.00.00"}}],"Components":[{"ProductId":"4eb19d4bacd949c58b5259eefcdc43ba","Versions":[{"DeviceClass":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Devices":{"Device":[{"DeviceName":"MT_0000000437","FirmwareImages":[{"DelayAfterInstallSec":10,"FileName":".//fw-ConnectX6Dx-rel-22_46_3048-MCX623106AS-CDA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","InstallDurationSec":3600,"Order":1,"ResetRequired":true,"Type":"Firmware","UEFIFlashable":false}],"Target":"a6b1a447-382a-5a4f-15b3-101d15b30042","Version":"22.46.3048"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - Network"},{"Lang":"ja","Value":"ファームウェア - ネットワーク"},{"Lang":"cn","Value":"固件 - 网络"}],"Description":[{"Lang":"en","Value":"This package contains the utilities and binary for upgrading HPE MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter firmware on ARM Linux Operating Systems."},{"Lang":"ja","Value":"This package contains the utilities and binary for upgrading HPE MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter firmware on ARM Linux Operating Systems."},{"Lang":"cn","Value":"This package contains the utilities and binary for upgrading HPE MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter firmware on ARM Linux Operating Systems."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Networking"},{"Lang":"ja","Value":"ネットワーク"},{"Lang":"cn","Value":"网络"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[{"Lang":"en","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter for HPE&nbsp;(P25960-B21)</td><td>22.46.3048</td><td>MT_0000000437</td></tr></tbody></table>"},{"Lang":"ja","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter for HPE&nbsp;(P25960-B21)</td><td>22.46.3048</td><td>MT_0000000437</td></tr></tbody></table>"},{"Lang":"cn","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter for HPE&nbsp;(P25960-B21)</td><td>22.46.3048</td><td>MT_0000000437</td></tr></tbody></table>"}],"Files":[{"Bytes":"11949632","DateModified":"2026-03-02T02:13:56","FileList":["./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1/CP068330.xml","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1/acpqsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1/cpqsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1/fw-ConnectX6Dx-rel-22_46_3048-MCX623106AS-CDA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1/ilorest_chif.so","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1/mft-4.32.0-120.tgz","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1/mlxfwmanager","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068330.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068330.scexe","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1/hpsetup"],"MD5Sum":"4b2c9966f8e32430d0b05be9fc8c2a3e","Name":"firmware-nic-mlnx-mcx623106as-cdat-22.46.3048-1.1_arm64.deb","Release":"2026-03-02T06:12:36","Revision":"","SHA1Sum":"4795b651191cadfee753f7752ddfb733afdff0df","SHA256Sum":"a969a634701412f7100fb0f0f759ae81d96b0e17f9663d45bec2b8824801cf4a","Size":"11MB","TargetGUIDs":["a6b1a447-382a-5a4f-15b3-101d15b30042"],"TypeOfChange":"1","Version":"22.46.3048"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"no"},"PerDeviceInstallTimeSeconds":3600,"RebootDetails":[{"Lang":"en","Value":"Reboot is required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要です。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"yes","RebootRequirement":"Required"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the DEB as: dpkg -i &lt;deb_filename&gt;.deb. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: dpkg --remove &lt;deb_package_name&gt;</li></ul>"},{"Lang":"ja","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the DEB as: dpkg -i &lt;deb_filename&gt;.deb. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: dpkg --remove &lt;deb_package_name&gt;</li></ul>"},{"Lang":"cn","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the DEB as: dpkg -i &lt;deb_filename&gt;.deb. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: dpkg --remove &lt;deb_package_name&gt;</li></ul>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Mellanox MCX623106AS-CDAT Online Firmware Upgrade Utility for Linux DEB aarch64"},{"Lang":"ja","Value":"Mellanox MCX623106AS-CDAT Online Firmware Upgrade Utility for Linux DEB aarch64"},{"Lang":"cn","Value":"Mellanox MCX623106AS-CDAT Online Firmware Upgrade Utility for Linux DEB aarch64"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"1024"},"SupportedDevices":[{"Dev":"101D","SubDev":"0042","SubVen":"15B3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101d15b30042","Type":"pci","Ven":"15B3"},{"Dev":"101e","SubDev":"0042","SubVen":"15B3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101e15b30042","Type":"pci","Ven":"15B3"}],"SupportedOperatingSystems":[{"Major":"20","Minor":"4","Name":"Ubuntu 20.04 LTS","Platform":"ubuntu","Sr":"OEM"},{"Major":"18","Minor":"4","Name":"Ubuntu 18.04","Platform":"Ubuntu","Sr":"OEM"},{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-12T08:03:45","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p><strong>New features and changes included in version&nbsp;22.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version&nbsp;22.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"en"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;22.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version&nbsp;22.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"ja"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;22.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version&nbsp;22.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"cn"}],"Version":"22.46.3048"}],"SWKeys":[{"Name":"MT_0000000437","SWKeyExpectedPath":"firmware:nic_mlnx_mcx623106as_cdat"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R12","Model":"HPE ProLiant RL340 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"ComboFirmware","UpdatableBy":["RuntimeAgent"],"VersionId":"fc5e000cdb5f4f50bf79c719ed913f8e"}]},{"ProductId":"6a248162d70b41cdb21bb1eb920815e7","Versions":[{"DeviceClass":"e7a8b7dd-a6c0-4056-b14a-97bc423ddc7b","Devices":{"Device":[]},"Package":{"Category":[{"Lang":"en","Value":"Application - System Management"},{"Lang":"ja","Value":"アプリケーション - システム マネジメント"},{"Lang":"cn","Value":"应用程序 - 系统管理"}],"Description":[{"Lang":"en","Value":"Integrated Smart Update Tools (iSUT) is an application which enables firmware and software deployment via the iLO management network using the server’s local administrator credentials. "},{"Lang":"ja","Value":"Integrated Smart Update Tools (iSUT) is an application which enables firmware and software deployment via the iLO management network using the server’s local administrator credentials. "},{"Lang":"cn","Value":"Integrated Smart Update Tools (iSUT) is an application which enables firmware and software deployment via the iLO management network using the server’s local administrator credentials. "}],"Divisions":[{"Division":[{"Lang":"en","Value":"Lights Out"},{"Lang":"ja","Value":"Lights Out"},{"Lang":"cn","Value":"Lights Out"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"5101654","DateModified":"2026-03-04T04:44:45","FileList":["./README.txt","./opt/hp/hpsut/README.txt","./opt/sut/README.txt","./opt/sut/bin/gatherlogs.sh","./opt/sut/bin/hpsut","./opt/sut/bin/sut","./opt/sut/config/sut_cfg_default.dat","./opt/sut/doc/OnDemandHelp.txt","./opt/sut/schemas/SUT.json","./opt/sut/schemas/SUTProvider.json","./opt/sut/schemas/SUTProvider_Gen10.json","./opt/sut/schemas/SUTRegistryEN_Legacy_zipped.json.gz","./opt/sut/schemas/SUTRegistryEN_Redfish.json","./opt/sut/schemas/SUTRegistryEN_Redfish_zipped.json.gz","./opt/sut/schemas/SUTRegistryJP_Legacy_zipped.json.gz","./opt/sut/schemas/SUTRegistryJP_Redfish_zipped.json.gz","./opt/sut/schemas/SUTSchema_Legacy_zipped.json.gz","./opt/sut/schemas/SUTSchema_Redfish_zipped.json.gz","./opt/sut/schemas/SUTSettings.json","./opt/sut/schemas/SUTSettingsSchema_Legacy_zipped.json.gz","./opt/sut/schemas/SUTSettingsSchema_Redfish_zipped.json.gz","./opt/sut/schemas/SUTSettings_Gen10.json","./opt/sut/schemas/SUTSystemInventorySchema_Legacy_zipped.json.gz","./opt/sut/schemas/SUTSystemInventorySchema_Redfish_zipped.json.gz","./opt/sut/schemas/SUTTasksettings.json","./opt/sut/schemas/SUTTasksettings_Legacy_zipped.json.gz","./opt/sut/schemas/SUTTasksettings_Redfish_zipped.json.gz","./opt/sut/schemas/SUT_Gen10.json","./opt/sut/scripts/sut.service","./opt/sut/scripts/sutd","./usr/share/doc/sut/changelog.gz","./usr/share/doc/sut/copyright","./usr/share/man/man8/sut.8.gz","./usr/share/smartupdate/sut/component.xml","./opt/sut/lib/x86_64-linux-gnu/libicudata.so.70","./opt/sut/lib/x86_64-linux-gnu/libicui18n.so.70","./opt/sut/lib/x86_64-linux-gnu/libicuuc.so.70"],"MD5Sum":"598fc93dd3429a43cd185000e216f8fc","Name":"sut-6.5.0-13_arm64.deb","Release":"2026-03-04T04:43:00","Revision":"","SHA1Sum":"40aeea0807fd5d069ddfcbe35fb57c216dd559bf","SHA256Sum":"d1e5a260f1049ac804490183f3d31933a6b60ca5b81a7c80fc13be46cdec774e","Size":"4MB","TargetGUIDs":["20a6e8e4-bf33-4c71-a6bf-d9ece09b5689"],"TypeOfChange":"1","Version":"6.5.0.0"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{},"PerDeviceInstallTimeSeconds":0,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p>Download the deb package to a directory on your hard drive and change to that directory. Install by typing dpkg -i&nbsp;sut-XXX_<a href=\"https://morphdl.ams.hpecorp.net/486266210910120323717081612221386517745/sut-6.5.0-7_arm64.deb\" id=\"ctl01_BuildFiles_FileLink_2\" target=\"_blank\">arm64.deb</a></p>"},{"Lang":"ja","Value":"<p>Download the deb package to a directory on your hard drive and change to that directory. Install by typing dpkg -i&nbsp;sut-XXX_<a href=\"https://morphdl.ams.hpecorp.net/486266210910120323717081612221386517745/sut-6.5.0-7_arm64.deb\" id=\"ctl01_BuildFiles_FileLink_2\" target=\"_blank\">arm64.deb</a></p>"},{"Lang":"cn","Value":"<p>Download the deb package to a directory on your hard drive and change to that directory. Install by typing dpkg -i&nbsp;sut-XXX_<a href=\"https://morphdl.ams.hpecorp.net/486266210910120323717081612221386517745/sut-6.5.0-7_arm64.deb\" id=\"ctl01_BuildFiles_FileLink_2\" target=\"_blank\">arm64.deb</a></p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Integrated Smart Update Tools for Linux(Ubuntu) ARM64"},{"Lang":"ja","Value":"Integrated Smart Update Tools for Linux(Ubuntu) ARM64"},{"Lang":"cn","Value":"Integrated Smart Update Tools for Linux(Ubuntu) ARM64"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"0"},"SupportedDevices":[{"Dev":"3307","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3307159000e4","Type":"pci","Ven":"103C"},{"Dev":"3307","SubDev":"0000","SubVen":"0000","TargetGUID":"a6b1a447-382a-5a4f-103C-330700000000","Type":"pci","Ven":"103C"},{"Dev":"3306","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3306159000e4","Type":"pci","Ven":"103C"},{"Dev":"3306","SubDev":"0000","SubVen":"0000","TargetGUID":"a6b1a447-382a-5a4f-103C-330600000000","Type":"pci","Ven":"103C"},{"Dev":"3306","SubDev":"03BA","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3306159003ba","Type":"pci","Ven":"103c"},{"Dev":"3307","SubDev":"03BA","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3307159003ba","Type":"pci","Ven":"103c"},{"Dev":"3306","SubDev":"3307","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-330615903307","Type":"pci","Ven":"103c"}],"SupportedOperatingSystems":[{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS ARM","Platform":"ubuntu2404","Sr":"OEM"},{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS ARM","Platform":"ubuntu2204","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2026-02-08T12:21:45","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Fixes":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Lang":"en"},{"Enhancements":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Fixes":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Lang":"ja"},{"Enhancements":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Fixes":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Lang":"cn"}],"Version":"6.5.0.0"}],"SWKeys":[{"Name":"sut","SWKeyExpectedPath":"software:deb"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"Software","UpdatableBy":["RuntimeAgent"],"VersionId":"3ba386e843e9498cb590a82fcddd5548"}]},{"ProductId":"76dddb8160694dcd97b82196c77c25e0","Versions":[{"DeviceClass":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Devices":{"Device":[{"DeviceName":"MT_0000000551","FirmwareImages":[{"DelayAfterInstallSec":10,"FileName":".//fw-ConnectX6Lx-rel-26_46_3048-MCX631432AS-ADA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","InstallDurationSec":600,"Order":1,"ResetRequired":true,"Type":"Firmware","UEFIFlashable":false}],"Target":"a6b1a447-382a-5a4f-15b3-101f15b30012","Version":"26.46.3048"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - Network"},{"Lang":"ja","Value":"ファームウェア - ネットワーク"},{"Lang":"cn","Value":"固件 - 网络"}],"Description":[{"Lang":"en","Value":"This package contains the utilities and binary for upgrading Mellanox MCX631432AS-ADAI Ethernet 10/25Gb 2-port SFP28 OCP3 Adapter for HPE firmware on ARM Linux Operating Systems."},{"Lang":"ja","Value":"このパッケージには、ARM Linuxオペレーティングシステム上でMellanox MCX631432AS-ADAI Ethernet 10/25Gb 2ポートSFP28 OCP3アダプターのHPEファームウェアをアップグレードするためのユーティリティとバイナリが含まれています。"},{"Lang":"cn","Value":"This package contains the utilities and binary for upgrading Mellanox MCX631432AS-ADAI Ethernet 10/25Gb 2-port SFP28 OCP3 Adapter for HPE firmware on ARM Linux Operating Systems."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Networking"},{"Lang":"ja","Value":"ネットワーク"},{"Lang":"cn","Value":"网络"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[{"Lang":"en","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>NVIDIA Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631432AS-ADAI Ethernet 10/25Gb 2-port SFP28 OCP3 Adapter for HPE&nbsp; (P42041-B21)</td><td>26.46.3048</td><td>MT_0000000551</td></tr></tbody></table>"},{"Lang":"ja","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>NVIDIA Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631432AS-ADAI Ethernet 10/25Gb 2-port SFP28 OCP3 Adapter for HPE&nbsp; (P42041-B21)</td><td>26.46.3048</td><td>MT_0000000551</td></tr></tbody></table>"},{"Lang":"cn","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>NVIDIA Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631432AS-ADAI Ethernet 10/25Gb 2-port SFP28 OCP3 Adapter for HPE&nbsp; (P42041-B21)</td><td>26.46.3048</td><td>MT_0000000551</td></tr></tbody></table>"}],"Files":[{"Bytes":"23341868","DateModified":"2026-02-05T04:23:52","FileList":["./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/CP068335.xml","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/acpqsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/binx.tgz","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/fw-ConnectX6Lx-rel-26_46_3048-MCX631432AS-ADA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/ilorest_chif.so","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/mft-4.32.0-120.tgz","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/mlxfwmanager","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068335.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068335.scexe"],"MD5Sum":"1b54bb3dfecb7d5f5d78dc0ef1b82f10","Name":"firmware-nic-mlnx-mcx631432as-adai-mt-0000000551-26.46.3048-1.1.aarch64.rpm","Release":"2026-02-05T08:15:04","Revision":"","SHA1Sum":"7abbaa07c6fbf5b90c7e4b7a7c40e65e04241f7b","SHA256Sum":"78ca483cc473408e805e1e7d8d1d90dd08a176d57786ccc11b784605576b2c4c","Size":"22MB","TargetGUIDs":["a6b1a447-382a-5a4f-15b3-101f15b30012"],"TypeOfChange":"1","Version":"26.46.3048"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"no"},"PerDeviceInstallTimeSeconds":600,"RebootDetails":[{"Lang":"en","Value":"Reboot is required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要です。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"yes","RebootRequirement":"Required"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>pdating firmware with rpm installed:</strong></p><ul><li>Install the RPM as: rpm -ivh &lt;rpm_filename&gt;.rpm. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: rpm -e &lt;rpm_package_name&gt;</li></ul><p><strong>Updating firmware without installing rpm:</strong></p><ul><li>Extract the contents of the rpm as: rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id</li><li>This will extract the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>From the terminal, navigate to &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run &quot; ./CPxxxxxx.scexe&quot;&quot; to update the firmware. The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed.</li></ul><p>&nbsp;</p><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"},{"Lang":"ja","Value":"<p><strong>pdating firmware with rpm installed:</strong></p><ul><li>Install the RPM as: rpm -ivh &lt;rpm_filename&gt;.rpm. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: rpm -e &lt;rpm_package_name&gt;</li></ul><p><strong>Updating firmware without installing rpm:</strong></p><ul><li>Extract the contents of the rpm as: rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id</li><li>This will extract the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>From the terminal, navigate to &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run &quot; ./CPxxxxxx.scexe&quot;&quot; to update the firmware. The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed.</li></ul><p>&nbsp;</p><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"},{"Lang":"cn","Value":"<p><strong>pdating firmware with rpm installed:</strong></p><ul><li>Install the RPM as: rpm -ivh &lt;rpm_filename&gt;.rpm. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: rpm -e &lt;rpm_package_name&gt;</li></ul><p><strong>Updating firmware without installing rpm:</strong></p><ul><li>Extract the contents of the rpm as: rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id</li><li>This will extract the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>From the terminal, navigate to &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run &quot; ./CPxxxxxx.scexe&quot;&quot; to update the firmware. The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed.</li></ul><p>&nbsp;</p><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Mellanox MCX631432AS-ADAI Online Firmware Upgrade Utility for Linux RPM aarch64"},{"Lang":"ja","Value":"Mellanox MCX631432AS-ADAIオンラインファームウェアアップグレードユーティリティfor Linux RPM aarch64"},{"Lang":"cn","Value":"Mellanox MCX631432AS-ADAI Online Firmware Upgrade Utility for Linux RPM aarch64"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"1024"},"SupportedDevices":[{"Dev":"101f","SubDev":"0007","SubVen":"15b3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101f15b30007","Type":"pci","Ven":"15b3"},{"Dev":"101E","SubDev":"0007","SubVen":"15B3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101e15b30007","Type":"pci","Ven":"15B3"}],"SupportedOperatingSystems":[{"Major":"7","Minor":"0","Name":"Red Hat Enterprise Linux 7 Server for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-12T08:03:51","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Lang":"en"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Lang":"ja"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Lang":"cn"}],"Version":"26.46.3048"}],"SWKeys":[{"Name":"MT_0000000551","SWKeyExpectedPath":"firmware:nic_mlnx_mcx631432as_adai"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R12","Model":"HPE ProLiant RL340 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"ComboFirmware","UpdatableBy":["RuntimeAgent"],"VersionId":"56db8aa839c84368bc1081eb471c3459"}]},{"ProductId":"b002929c00884d0e9531c069bb252f8b","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VV030720KYNYP","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"SP54308KHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3033-3732-304b594e5950","Version":"HPK6"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive model: VV030720KYNYP"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive model: VV030720KYNYP"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux deb (arm64)&nbsp;- VV030720KYNYP Drive<br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6<br /><strong>Last Recommended or Critical Version:</strong><br />&nbsp; &nbsp; &nbsp;None<br /><strong>Previous Version of Firmware:</strong><br />&nbsp; &nbsp; &nbsp;None<br /><strong>Firmware Dependency:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; None</p><p><strong>Enhancements/New Features:</strong></p><p>&nbsp;&nbsp;&nbsp;&nbsp; None</p><p><strong>Problems Fixed:</strong></p><ul><li>HPK6 is a planned maintenance release that follows the HPK3 FW release for&nbsp;30.72TB (8K IU) Solid State Drive. This is a recommended FW release.</li><li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us\" style=\"color:blue; text-decoration:underline\">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us</a></li></ul><p><strong>Known Issues:</strong><br />&nbsp; &nbsp; &nbsp; None</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux deb (arm64)&nbsp;- VV030720KYNYP Drive<br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6<br /><strong>Last Recommended or Critical Version:</strong><br />&nbsp; &nbsp; &nbsp;None<br /><strong>Previous Version of Firmware:</strong><br />&nbsp; &nbsp; &nbsp;None<br /><strong>Firmware Dependency:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; None</p><p><strong>Enhancements/New Features:</strong></p><p>&nbsp;&nbsp;&nbsp;&nbsp; None</p><p><strong>Problems Fixed:</strong></p><ul><li>HPK6 is a planned maintenance release that follows the HPK3 FW release for&nbsp;30.72TB (8K IU) Solid State Drive. This is a recommended FW release.</li><li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us\" style=\"color:blue; text-decoration:underline\">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us</a></li></ul><p><strong>Known Issues:</strong><br />&nbsp; &nbsp; &nbsp; None</p>"}],"Files":[{"Bytes":"7653712","DateModified":"2025-11-27T08:35:03","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/CP069876.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/SP54308KHPK6.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP069876.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP069876.scexe"],"MD5Sum":"01b53c32f5a0ea875d95b0e074b6a172","Name":"firmware-hdd-399ac3ba76-0HPK6-1.1_arm64.deb","Release":"2025-11-27T12:32:05","Revision":"","SHA1Sum":"0271f2e15df2333d0b27807b896a4abb6fd9c8e4","SHA256Sum":"f1093e77fddddd34f631aeb87c3d87b1fe9b14dac8c8367cf570cc8ce2087ef6","Size":"7MB","TargetGUIDs":["562340a5-3056-3033-3732-304b594e5950"],"TypeOfChange":"1","Version":"HPK6"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp;&nbsp;<em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command:&nbsp;<em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command:&nbsp;<em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to&nbsp;<em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp;&nbsp;<em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command:&nbsp;<em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command:&nbsp;<em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to&nbsp;<em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - VV030720KYNYP Drive"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - VV030720KYNYP Drive"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VV030720KYNYP","TargetGUID":"562340a5-3056-3033-3732-304b594e5950","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"},{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-12-27T08:29:15","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>HPK6 is a planned maintenance release that follows the HPK3 FW release for&nbsp;30.72TB (8K IU) Solid State Drive. This is a recommended FW release.</li><li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us</a></li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>HPK6 is a planned maintenance release that follows the HPK3 FW release for&nbsp;30.72TB (8K IU) Solid State Drive. This is a recommended FW release.</li><li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us</a></li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>HPK6 is a planned maintenance release that follows the HPK3 FW release for&nbsp;30.72TB (8K IU) Solid State Drive. This is a recommended FW release.</li><li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us</a></li></ul>","Lang":"cn"}],"Version":"HPK6"}],"SWKeys":[{"Name":"VV030720KYNYP","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"c8e0a5af1b7d4f41a51a916b35263876"}]},{"ProductId":"fb74539dba324e6c8e7e3e407ff07773","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VR000480KXLXF","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM9A3SAHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3438-304b584c5846","Version":"HPK4"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000480KXLXF"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000480KXLXF"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online NVMe SSD Flash Component for Linux deb (arm64) - VR000480KXLXF Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK4</p><p><br />&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online NVMe SSD Flash Component for Linux deb (arm64) - VR000480KXLXF Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK4</p><p><br />&nbsp;</p>"}],"Files":[{"Bytes":"11038152","DateModified":"2025-08-24T21:11:30","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/CP068505.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/GPM9A3SAHPK4.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068505.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068505.scexe"],"MD5Sum":"9a435e24b69192b60390b31c761316f9","Name":"firmware-hdd-5adaf7ae6f-0HPK4-1.1_arm64.deb","Release":"2025-08-25T01:07:33","Revision":"","SHA1Sum":"d2f3885ac79e385aed84e66d9b9265bb2810fe70","SHA256Sum":"e1baeaa31d17fe791f7d9dd0b17da8604e8d30a42829822f126d6b3c6e14a418","Size":"10MB","TargetGUIDs":["562340a5-3052-3030-3438-304b584c5846"],"TypeOfChange":"1","Version":"HPK4"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - VR000480KXLXF Drive"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - VR000480KXLXF Drive"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VR000480KXLXF","TargetGUID":"562340a5-3052-3030-3438-304b584c5846","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-24T21:53:01","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>This FW update contains the fix for false ILO message of temporary drive &quot;degraded&quot; status.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>This FW update contains the fix for false ILO message of temporary drive &quot;degraded&quot; status.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>This FW update contains the fix for false ILO message of temporary drive &quot;degraded&quot; status.</li></ul>","Lang":"cn"}],"Version":"HPK4"}],"SWKeys":[{"Name":"VR000480KXLXF","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"ee3cf54c854d43de9e8a3596a582b95d"}]},{"ProductId":"3def138602444d29bec350a2ccf276bf","Versions":[{"DeviceClass":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Devices":{"Device":[{"DeviceName":"MT_0000000437","FirmwareImages":[{"DelayAfterInstallSec":10,"FileName":".//fw-ConnectX6Dx-rel-22_46_3048-MCX623106AS-CDA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","InstallDurationSec":360,"Order":1,"ResetRequired":true,"Type":"Firmware","UEFIFlashable":false}],"Target":"a6b1a447-382a-5a4f-15b3-101d15b30042","Version":"22.46.3048"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - Network"},{"Lang":"ja","Value":"ファームウェア - ネットワーク"},{"Lang":"cn","Value":"固件 - 网络"}],"Description":[{"Lang":"en","Value":"This package contains the utilities and binary for upgrading HPE MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter firmware on ARM Linux Operating Systems."},{"Lang":"ja","Value":"This package contains the utilities and binary for upgrading HPE MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter firmware on ARM Linux Operating Systems."},{"Lang":"cn","Value":"This package contains the utilities and binary for upgrading HPE MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter firmware on ARM Linux Operating Systems."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Networking"},{"Lang":"ja","Value":"ネットワーク"},{"Lang":"cn","Value":"网络"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[{"Lang":"en","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter for HPE&nbsp;(P25960-B21)</td><td>22.46.3048</td><td>MT_0000000437</td></tr></tbody></table><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter for HPE&nbsp;(P25960-B21)</td><td>22.46.3048</td><td>MT_0000000437</td></tr></tbody></table><p>&nbsp;</p>"},{"Lang":"cn","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX623106AS-CDAT Ethernet 100Gb 2-port QSFP56 Adapter for HPE&nbsp;(P25960-B21)</td><td>22.46.3048</td><td>MT_0000000437</td></tr></tbody></table><p>&nbsp;</p>"}],"Files":[{"Bytes":"23593998","DateModified":"2026-02-05T03:59:23","FileList":["./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/CP068331.xml","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/acpqsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/binx.tgz","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/fw-ConnectX6Dx-rel-22_46_3048-MCX623106AS-CDA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/ilorest_chif.so","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/mft-4.32.0-120.tgz","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/mlxfwmanager","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068331.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068331.scexe"],"MD5Sum":"1796353c77465e5a6fbacf643472c1c0","Name":"firmware-nic-mlnx-mcx623106as-cdat-mt-0000000437-22.46.3048-1.1.aarch64.rpm","Release":"2026-02-05T07:50:31","Revision":"","SHA1Sum":"f193297b52c90532c134dbbd487b59255b6ddf3b","SHA256Sum":"e5e2d7a733792ae523e7e29ec8cc3c4c04ef89bd1eff75c462ea61fd02abb6e1","Size":"22MB","TargetGUIDs":["a6b1a447-382a-5a4f-15b3-101d15b30042"],"TypeOfChange":"1","Version":"22.46.3048"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"no"},"PerDeviceInstallTimeSeconds":360,"RebootDetails":[{"Lang":"en","Value":"Reboot is required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要です。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"yes","RebootRequirement":"Required"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the RPM as: rpm -ivh &lt;rpm_filename&gt;.rpm. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: rpm -e &lt;rpm_package_name&gt;</li></ul><p><strong>Updating firmware without installing rpm:</strong></p><ul><li>Extract the contents of the rpm as: rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id</li><li>This will extract the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>From the terminal, navigate to &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location and run &quot; ./CPxxxxxx.scexe&quot;&quot; to update the firmware. The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed.</li></ul>"},{"Lang":"ja","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the RPM as: rpm -ivh &lt;rpm_filename&gt;.rpm. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: rpm -e &lt;rpm_package_name&gt;</li></ul><p><strong>Updating firmware without installing rpm:</strong></p><ul><li>Extract the contents of the rpm as: rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id</li><li>This will extract the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>From the terminal, navigate to &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location and run &quot; ./CPxxxxxx.scexe&quot;&quot; to update the firmware. The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed.</li></ul>"},{"Lang":"cn","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the RPM as: rpm -ivh &lt;rpm_filename&gt;.rpm. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: rpm -e &lt;rpm_package_name&gt;</li></ul><p><strong>Updating firmware without installing rpm:</strong></p><ul><li>Extract the contents of the rpm as: rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id</li><li>This will extract the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>From the terminal, navigate to &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location and run &quot; ./CPxxxxxx.scexe&quot;&quot; to update the firmware. The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed.</li></ul>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Mellanox MCX623106AS-CDAT Online Firmware Upgrade Utility for Linux RPM aarch64"},{"Lang":"ja","Value":"Mellanox MCX623106AS-CDAT Online Firmware Upgrade Utility for Linux RPM aarch64"},{"Lang":"cn","Value":"Mellanox MCX623106AS-CDAT Online Firmware Upgrade Utility for Linux RPM aarch64"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"1024"},"SupportedDevices":[{"Dev":"101D","SubDev":"0042","SubVen":"15B3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101d15b30042","Type":"pci","Ven":"15B3"},{"Dev":"101e","SubDev":"0042","SubVen":"15B3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101e15b30042","Type":"pci","Ven":"15B3"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-12T08:03:46","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p><strong>New features and changes included in version&nbsp;22.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version&nbsp;22.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Lang":"en"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;22.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version&nbsp;22.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Lang":"ja"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;22.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version&nbsp;22.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Lang":"cn"}],"Version":"22.46.3048"}],"SWKeys":[{"Name":"MT_0000000437","SWKeyExpectedPath":"firmware:nic_mlnx_mcx623106as_cdat"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R12","Model":"HPE ProLiant RL340 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"ComboFirmware","UpdatableBy":["RuntimeAgent"],"VersionId":"45a052b4f6fa4035b1e3e7676b8408b8"}]},{"ProductId":"73237dcf4c294040afe9d21c1a39bbf6","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VR000960YYXPR","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KPE9010SHPK2.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3936-305959585052","Version":"HPK2"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000960YYXPR"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000960YYXPR"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux deb (arm64) - VR000960YYXPR Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK2</p><p><br />&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux deb (arm64) - VR000960YYXPR Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK2</p><p><br />&nbsp;</p>"}],"Files":[{"Bytes":"9009388","DateModified":"2026-01-07T04:30:59","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/CP068511.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/KPE9010SHPK2.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068511.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068511.scexe"],"MD5Sum":"0ebed347be25a53c0fc5bb228ed02816","Name":"firmware-hdd-1b87ca8270-0HPK2-1.1_arm64.deb","Release":"2026-01-07T08:28:05","Revision":"","SHA1Sum":"f849e5f5c3c41a1aa8a4a78f60d301849983f092","SHA256Sum":"69d438c98ef8f83ad58bdeb6ebbb540433d3279110e796722df7fc48ace9ff59","Size":"8MB","TargetGUIDs":["562340a5-3052-3030-3936-305959585052"],"TypeOfChange":"1","Version":"HPK2"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - VR000960YYXPR Drive"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - VR000960YYXPR Drive"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VR000960YYXPR","TargetGUID":"562340a5-3052-3030-3936-305959585052","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-24T22:11:43","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"cn"}],"Version":"HPK2"}],"SWKeys":[{"Name":"VR000960YYXPR","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"cc23f83dde2f404698c30592d79ddfc4"}]},{"ProductId":"4742f9d3cc464355ba3857b16f5bb333","Versions":[{"DeviceClass":"231cd606-a7f5-4ab6-bed8-823582227a3d","Devices":{"Device":[{"DeviceName":"BIOS_SCP BUNDLE","FirmwareImages":[{"DelayAfterInstallSec":0,"DirectFlashOK":true,"FileName":"R11_1.80_01_09_2026_scp_2.10.20240201_appended_binded_signed.bin","InstallDurationSec":120,"Order":1,"PLDMImage":false,"ResetRequired":true,"ServerPowerOff":true,"SysPowerOn":false,"Type":"Firmware","UEFIFlashable":true}],"Target":"00000000-0000-0000-0000-000000000250","Version":"v1.80 (01/09/2026)"}]},"Package":{"Category":[{"Lang":"en","Value":"BIOS - System ROM"}],"Description":[{"Lang":"en","Value":"This firmware package provides updated system firmware that can be installed online through the use of tools such as Smart Update Manager (SUM) and the RESTful Interface Tool (iLOrest) on supported Operating Systems. Additionally, when used in conjunction with SUM or iLOrest, this firmware package allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update."},{"Lang":"ja","Value":"このファームウェアパッケージは、サポート対象のオペレーティングシステムでSmart Update Manager（SUM）やRESTfulインターフェイスツール（iLOrest）などのツールを使用して、オンラインでインストールできるアップデートされたシステムファームウェアを提供します。さらに、SUMまたはiLOrestと共に使用する場合、このファームウェアパッケージは、ユーザーが中央ロケーションからリモートサーバー上のファームウェアをアップデートすることを可能にします。このリモート展開機能により、ファームウェアをアップデートするために使用者がサーバーへ物理的に移動する必要がなくなります。"},{"Lang":"cn","Value":"This firmware package provides updated system firmware that can be installed online through the use of tools such as Smart Update Manager (SUM) and the RESTful Interface Tool (iLOrest) on supported Operating Systems. Additionally, when used in conjunction with SUM or iLOrest, this firmware package allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"33862772","DateModified":"2026-01-13T07:02:05","FileList":["payload.json","R11_1.80_01_09_2026_scp_2.10.20240201_appended_binded.xml","R11_1.80_01_09_2026_scp_2.10.20240201_appended_binded_signed.bin"],"MD5Sum":"59c019816dae54d53b9a3ba6a6fda068","Name":"R11_1.80_01_09_2026_scp_2.10.20240201_appended_binded.fwpkg","Release":"2026-01-13T06:58:52","Revision":"","SHA1Sum":"b46d2779ccc380221d10cf8bb4e8ec81b37a1f28","SHA256Sum":"5c82f3c1bc4e7a4419c5151ae9f2780e319427a3dcb249c67f95a0744e283bfc","Size":"32MB","TargetGUIDs":["00000000-0000-0000-0000-000000000250"],"TypeOfChange":"1","Version":"1.80_01-09-2026"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"no"},"PerDeviceInstallTimeSeconds":0,"RebootDetails":[{"Lang":"en","Value":"Reboot is required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要です。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"yes","RebootRequirement":"Required"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.0","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.0","OSVersion":{"Name":"VMware","Value":"5.0"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.0.3.9-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.0","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.0","OSVersion":{"Name":"VMware","Value":"5.0"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecf961a5f4","SWKey":"char-hpcru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.0.3.9-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.1","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.1","OSVersion":{"Name":"VMware","Value":"5.1"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.0.3.9-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.1","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.1","OSVersion":{"Name":"VMware","Value":"5.1"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecf961a5f4","SWKey":"char-hpcru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.0.3.9-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.5","OSVersion":{"Name":"VMware","Value":"5.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.5.4.1-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.5","OSVersion":{"Name":"VMware","Value":"5.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecf961a5f4","SWKey":"char-hpcru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.5.4.1-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.5","OSVersion":{"Name":"VMware","Value":"5.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec53c3d5a6","SWKey":"cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.5.4.1-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.0","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.0","OSVersion":{"Name":"VMware","Value":"6.0"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec53c3d5a6","SWKey":"cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.0.8.0-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.0","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.0","OSVersion":{"Name":"VMware","Value":"6.0"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.0.8.0-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.5","OSVersion":{"Name":"VMware","Value":"6.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec53c3d5a6","SWKey":"cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.5.8.0-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.5","OSVersion":{"Name":"VMware","Value":"6.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.5.8.0-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.5","OSVersion":{"Name":"VMware","Value":"6.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec53c3d5a6","SWKey":"cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"650.6.5.8"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.5","OSVersion":{"Name":"VMware","Value":"6.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"650.6.5.8"},{"Condition":"AlreadyActive","Description":"HPE CRU Driver Bundle Smart Component for ESXi 7.0 version 700.10.16-1OEM.700.0.0.14828939 or greater is required and should be already active","DeviceGUID":"","Message":"HPE CRU Driver Bundle Smart Component for ESXi 7.0 version 700.10.16-1OEM.700.0.0.14828939 or greater is required and should be already active","OSVersion":{"Name":"VMware","Value":"7.0"},"RequirementGUID":"","SWKey":"cru-driver","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"700.10.16-1OEM.700.0.0.14828939"},{"Condition":"AlreadyActive","Description":"HPE CRU Driver Bundle Smart Component for ESXi 7.0 version 700.10.16-1OEM.700.0.0.14828939 or greater is required and should be already active","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HPE CRU Driver Bundle Smart Component for ESXi 7.0 version 700.10.16-1OEM.700.0.0.14828939 or greater is required and should be already active","OSVersion":{"Name":"VMware","Value":"7.0"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec53c3d5a6","SWKey":"cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"700.10.16-1OEM.700.0.0.14828939"}]},{"ListConditional":"OR","Requirement":[{"Condition":"InstalledBefore","Description":"HP ProLiant Integrated Lights-Out Management Interface Driver for Windows","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP ProLiant Integrated Lights-Out Management Interface Driver for Windows","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ece65aa5f6","SWKey":"hpqilo3chif.sys","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HP Lights-Out Drivers and Agents for Linux","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP Lights-Out Drivers and Agents for Linux","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec587429e7","SWKey":"cpqci","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HP Lights-Out Drivers and Agents for Linux","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP Lights-Out Drivers and Agents for Linux","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9eca0b72f1f","SWKey":"hp_ilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HP Lights-Out Drivers and Agents for Linux","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP Lights-Out Drivers and Agents for Linux","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec6d7bdce8","SWKey":"hpilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HP Channel Interface Driver for VMWare","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP Channel Interface Driver for VMWare","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecf1c92383","SWKey":"char-hpilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HPE Channel Interface Driver for VMware","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HPE Channel Interface Driver for VMware","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec2fe7fb84","SWKey":"hpe-ilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HPE Channel Interface Driver for VMware","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HPE Channel Interface Driver for VMware","OSVersion":{"Name":"VMware","Value":"*"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecb1b2cabc","SWKey":"ilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HPE Channel Interface Driver for VMware","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HPE Channel Interface Driver for VMware","OSVersion":{"Name":"VMware","Value":"*"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecb1b2cabc","SWKey":"ilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HPE iLO Driver Bundle Smart Component for ESXi 7.0 version 700.10.1.0.16-1OEM.700.0.0.14828939 or greater is required and should be already active","DeviceGUID":"","Message":"HPE iLO Driver Bundle Smart Component for ESXi 7.0 version 700.10.1.0.16-1OEM.700.0.0.14828939 or greater is required and should be already active","OSVersion":{"Name":"VMware","Value":"*"},"RequirementGUID":"","SWKey":"ilo-driver","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"InstalledBefore","Description":"HP ProLiant iLO 5 Channel Interface Driver for Windows must be installed prior to this component","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP ProLiant iLO 5 Channel Interface Driver for Windows must be installed prior to this component","OSVersion":{"Name":"Windows","Value":"*"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec1417651e","SWKey":"necheschif.sys","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p>To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"https://www.hpe.com/info/resttool\" style=\"color:#0563c1; text-decoration:underline\">https://www.hpe.com/info/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>localhost OS example:<br /><em><strong>ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</strong></em></p><p>remote example:<br /><em><strong>ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO6_IP_Address&gt; -u &lt;iLO6_username&gt; -p &lt;iLO6_password&gt;</strong></em></p>"},{"Lang":"ja","Value":"<p>このファームウェアパッケージをフラッシュするには、次のiLOrestコマンドを使用します。 iLOrestツールの最新バージョンをダウンロードするには、<a href=\"https://www.hpe.com/info/resttool\" style=\"color:#0563c1; text-decoration:underline\">https://www.hpe.com/info/resttool</a>を参照してください。</p><p>ローカルホストOSの例：<br /><em><strong>ilorest flashfwpkg <file_name.fwpkg> </strong></em></p><p>リモートの例:<br /><em><strong>    ilorest flashfwpkg <file_name.fwpkg> --url <iLO6_IP_Address> -u <iLO6_username> -p <iLO6_password></strong></em></p>"},{"Lang":"cn","Value":"<p>To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"https://www.hpe.com/info/resttool\" style=\"color:#0563c1; text-decoration:underline\">https://www.hpe.com/info/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>localhost OS example:<br /><em><strong>ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</strong></em></p><p>remote example:<br /><em><strong>ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO6_IP_Address&gt; -u &lt;iLO6_username&gt; -p &lt;iLO6_password&gt;</strong></em></p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"ROM Flash Firmware Package - HPE ProLiant RL300 Gen11 (R11)"},{"Lang":"ja","Value":"ROMフラッシュファームウェアパッケージ - HPE ProLiant RL300 Gen11（R11）"},{"Lang":"cn","Value":"ROM Flash Firmware Package - HPE ProLiant RL300 Gen11 (R11)"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"32000"},"SupportedOperatingSystems":[{"Major":"7","Minor":"0","Name":"VMware ESXi 7.0","Platform":"vmware_esx_server","Sr":"OEM"},{"Major":"0","Minor":"0","Name":"Cross Operating System","Platform":"oi","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2026-02-12T03:50:51","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>Enhanced error logging when the DIMM serial number is invalid.</p>","Fixes":"<p><strong>Important Notes:</strong></p><p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">Security Bulletin Library | HPE Support</a>.</p></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the VLAN tag is not added to the UEFI network device path when the VLAN configuration is enabled in RBSU.</p><p><strong>Known Issues:</strong></p>None","Lang":"en"},{"Enhancements":"<p>DIMMのシリアル番号が無効な場合にエラーログが強化されました。</p>","Fixes":"<p><strong>重要な注意：</strong></p><p><p>報告されたセキュリティ脆弱性とその緩和策の詳細については、リンク<a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">セキュリティ報告ライブラリ | HPEサポート</a>を参照してください。</p></p><p><strong>ファームウェアの依存関係：</strong></p>なし<p><strong>修正された問題：</strong></p><p>RBSUでVLAN構成が有効になっている場合に、VLANタグがUEFIネットワークデバイスパスに追加されない問題に対処しました。</p><p><strong>既知の問題点：</strong></p>なし","Lang":"ja"},{"Enhancements":"<p>Enhanced error logging when the DIMM serial number is invalid.</p>","Fixes":"<p><strong>Important Notes:</strong></p><p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">Security Bulletin Library | HPE Support</a>.</p></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue where the VLAN tag is not added to the UEFI network device path when the VLAN configuration is enabled in RBSU.</p><p><strong>Known Issues:</strong></p>None","Lang":"cn"}],"Version":"1.78_06-05-2025"},{"ReleaseNotes":[{"Enhancements":"","Fixes":"<p><strong>Important Notes:</strong></p><p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">Security Bulletin Library | HPE Support</a>.</p></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue which prevented the installation of RHEL 9.7 and RHEL 10.1 when Secure Boot is enabled.</p><p><strong>Known Issues:</strong></p>None","Lang":"en"},{"Enhancements":"","Fixes":"<p><strong>Important Notes:</strong></p><p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">Security Bulletin Library | HPE Support</a>.</p></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue which prevented the installation of RHEL 9.7 and RHEL 10.1 when Secure Boot is enabled.</p><p><strong>Known Issues:</strong></p>None","Lang":"ja"},{"Enhancements":"","Fixes":"<p><strong>Important Notes:</strong></p><p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">Security Bulletin Library | HPE Support</a>.</p></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Addressed an issue which prevented the installation of RHEL 9.7 and RHEL 10.1 when Secure Boot is enabled.</p><p><strong>Known Issues:</strong></p>None","Lang":"cn"}],"Version":"1.80_01-09-2026"}],"SWKeys":[{"Name":"R11","SWKeyExpectedPath":"firmware:system"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"}],"UpgradeRequirements":"Recommended"},"PackageFormat":"FWPKG-v2","Type":"Firmware","UpdatableBy":["Bmc"],"VersionId":"d75eae6d76dc46cfb1abc1421100d05a"}]},{"ProductId":"9f0c779b2d5a4a10a44b4fa809e1b8f3","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VR000960YYXPR","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KPE9010SHPK2.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3936-305959585052","Version":"HPK2"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000960YYXPR"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000960YYXPR"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VR000960YYXPR Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK2</p><p><br />&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VR000960YYXPR Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK2</p><p><br />&nbsp;</p>"}],"Files":[{"Bytes":"5104536","DateModified":"2026-01-07T04:25:05","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/CP068510.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/KPE9010SHPK2.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-1b87ca8270-HPK2-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068510.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068510.scexe"],"MD5Sum":"c3a4d871145b27e7855d320016cca40e","Name":"firmware-hdd-1b87ca8270-HPK2-1.1.aarch64.rpm","Release":"2026-01-07T08:17:04","Revision":"","SHA1Sum":"14002ba7ec4d710555a47ec627c6a087c5dcb9bf","SHA256Sum":"13e30124b782e8e32db7997784de607d37431094d1ad65548b7733ebd8d492c2","Size":"4MB","TargetGUIDs":["562340a5-3052-3030-3936-305959585052"],"TypeOfChange":"1","Version":"HPK2"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux (arm64) - VR000960YYXPR Drive"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux (arm64) - VR000960YYXPR Drive"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VR000960YYXPR","TargetGUID":"562340a5-3052-3030-3936-305959585052","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-24T22:11:04","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"cn"}],"Version":"HPK2"}],"SWKeys":[{"Name":"VR000960YYXPR","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"ab34bade16974cd2b0cf062f7f53a393"}]},{"ProductId":"04317d41c98c4b50aa219893021f0ae4","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VR000480KYXPQ","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KPE9010IHPK2.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3438-304b59585051","Version":"HPK2"},{"DeviceName":"VR000960KYXQA","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KPE9010IHPK2.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3936-304b59585141","Version":"HPK2"},{"DeviceName":"VR001920KYXQB","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KPE9010IHPK2.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3130-3932-304b59585142","Version":"HPK2"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK2</p><p><br />&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK2</p><p><br />&nbsp;</p>"}],"Files":[{"Bytes":"8812735","DateModified":"2026-01-07T04:08:06","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/CP068508.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/KPE9010IHPK2.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068508.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068508.scexe"],"MD5Sum":"5193abbdd81805c51cace589fb9f8b54","Name":"firmware-hdd-4b748c8174-HPK2-1.1.aarch64.rpm","Release":"2026-01-07T07:59:11","Revision":"","SHA1Sum":"169bd7e54a5cdf02dd92a66532bf5cc8d2879a63","SHA256Sum":"e84d41996174b9f1d992a7e60c7bae7f01522ad61979d2151664651739920ed5","Size":"8MB","TargetGUIDs":["562340a5-3052-3030-3438-304b59585051","562340a5-3052-3030-3936-304b59585141","562340a5-3052-3130-3932-304b59585142"],"TypeOfChange":"1","Version":"HPK2"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux (arm64) - VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB Drive"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux (arm64) - VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB Drive"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VR000480KYXPQ","TargetGUID":"562340a5-3052-3030-3438-304b59585051","Type":"nvme"},{"Id":"VR000960KYXQA","TargetGUID":"562340a5-3052-3030-3936-304b59585141","Type":"nvme"},{"Id":"VR001920KYXQB","TargetGUID":"562340a5-3052-3130-3932-304b59585142","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-24T22:05:53","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"cn"}],"Version":"HPK2"}],"SWKeys":[{"Name":"VR000480KYXPQ","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VR000960KYXQA","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VR001920KYXQB","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"ddfbae88fbdd42d4a25a5e5b42e5b57c"}]},{"ProductId":"5ab238d3f20c4e118b6d9d89e3b9a687","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"MZXLR800HBHQ-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3830-3048c3876295","Version":"MPK7825Q"},{"DeviceName":"MZXLR1T6HBJR-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3154-3648ddfaa3a6","Version":"MPK7825Q"},{"DeviceName":"MZXLR3T2HBLS-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3354-3248a4bea716","Version":"MPK7825Q"},{"DeviceName":"MZXLR6T4HALA-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3654-3448e7bd3d2a","Version":"MPK7825Q"},{"DeviceName":"MZXLR12THALA-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3132-544869b8df72","Version":"MPK7825Q"},{"DeviceName":"MZXLR960HBHQ-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3936-3048d2d64915","Version":"MPK7825Q"},{"DeviceName":"MZXLR1T9HBJR-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3154-3948cda93afa","Version":"MPK7825Q"},{"DeviceName":"MZXLR3T8HBLS-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3354-3848df400867","Version":"MPK7825Q"},{"DeviceName":"MZXLR7T6HALA-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3754-36484bc80db1","Version":"MPK7825Q"},{"DeviceName":"MZXLR15THALA-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3135-5448e88a517e","Version":"MPK7825Q"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3"},{"Lang":"cn","Value":"This arm64 Smart Component provides firmware for the following drive models: MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive models: MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Online NVMe SSD Flash Component for Linux (arm64) - MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3&nbsp; Drives<br />&nbsp;<br /><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>MPK7825Q</p><p><strong>Last Recommended or Critical Version:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Previous Version of Firmware:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Firmware Dependency:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>None</p><p><strong>Enhancements/New Features :</strong></p><p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>None</p><p><strong>Problem Fixed:</strong></p><ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul><p><strong>Known Issues:</strong></p><p><strong>&nbsp; &nbsp;&nbsp; </strong>None</p>"},{"Lang":"cn","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Online NVMe SSD Flash Component for Linux (arm64) - MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3&nbsp; Drives<br />&nbsp;<br /><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>MPK7825Q</p><p><strong>Last Recommended or Critical Version:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Previous Version of Firmware:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Firmware Dependency:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>None</p><p><strong>Enhancements/New Features :</strong></p><p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>None</p><p><strong>Problem Fixed:</strong></p><ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul><p><strong>Known Issues:</strong></p><p><strong>&nbsp; &nbsp;&nbsp; </strong>None</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Online NVMe SSD Flash Component for Linux (arm64) - MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3&nbsp; Drives<br />&nbsp;<br /><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>MPK7825Q</p><p><strong>Last Recommended or Critical Version:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Previous Version of Firmware:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Firmware Dependency:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>None</p><p><strong>Enhancements/New Features :</strong></p><p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>None</p><p><strong>Problem Fixed:</strong></p><ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul><p><strong>Known Issues:</strong></p><p><strong>&nbsp; &nbsp;&nbsp; </strong>None</p>"}],"Files":[{"Bytes":"8586051","DateModified":"2025-11-27T09:47:02","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/CP069900.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/MPK7825Q.bin","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP069900.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP069900.scexe"],"MD5Sum":"88df4ac6403e4696a3e0f5cd2aaf903d","Name":"firmware-hdd-951aefd63e-MPK7825Q-1.1.aarch64.rpm","Release":"2025-11-27T13:38:51","Revision":"","SHA1Sum":"ff1ee7962dadd49728226560b49c80a1c468af73","SHA256Sum":"4bba7d4737c578a7cda1cd54983d4f0e88bd2b08cd3f719018d60e1852afadd6","Size":"8MB","TargetGUIDs":["4d2340a5-585a-524c-3830-3048c3876295","4d2340a5-585a-524c-3154-3648ddfaa3a6","4d2340a5-585a-524c-3354-3248a4bea716","4d2340a5-585a-524c-3654-3448e7bd3d2a","4d2340a5-585a-524c-3132-544869b8df72","4d2340a5-585a-524c-3936-3048d2d64915","4d2340a5-585a-524c-3154-3948cda93afa","4d2340a5-585a-524c-3354-3848df400867","4d2340a5-585a-524c-3754-36484bc80db1","4d2340a5-585a-524c-3135-5448e88a517e"],"TypeOfChange":"1","Version":"MPK7825Q"}],"Installation":{"Command":"CP043037.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"cn","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux (arm64)MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3 Drive"},{"Lang":"cn","Value":"Online NVMe SSD Flash Component for Linux (arm64)MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3 Drive"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux (arm64)MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3 Drive"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"6000"},"SupportedDevices":[{"Id":"MZXLR12THALA-000H3","TargetGUID":"4d2340a5-585a-524c-3132-544869b8df72","Type":"nvme"},{"Id":"MZXLR15THALA-000H3","TargetGUID":"4d2340a5-585a-524c-3135-5448e88a517e","Type":"nvme"},{"Id":"MZXLR7T6HALA-000H3","TargetGUID":"4d2340a5-585a-524c-3754-36484bc80db1","Type":"nvme"},{"Id":"MZXLR1T6HBJR-000H3","TargetGUID":"4d2340a5-585a-524c-3154-3648ddfaa3a6","Type":"nvme"},{"Id":"MZXLR800HBHQ-000H3","TargetGUID":"4d2340a5-585a-524c-3830-3048c3876295","Type":"nvme"},{"Id":"MZXLR3T2HBLS-000H3","TargetGUID":"4d2340a5-585a-524c-3354-3248a4bea716","Type":"nvme"},{"Id":"MZXLR6T4HALA-000H3","TargetGUID":"4d2340a5-585a-524c-3654-3448e7bd3d2a","Type":"nvme"},{"Id":"MZXLR1T9HBJR-000H3","TargetGUID":"4d2340a5-585a-524c-3154-3948cda93afa","Type":"nvme"},{"Id":"MZXLR3T8HBLS-000H3","TargetGUID":"4d2340a5-585a-524c-3354-3848df400867","Type":"nvme"},{"Id":"MZXLR960HBHQ-000H3","TargetGUID":"4d2340a5-585a-524c-3936-3048d2d64915","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"},{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-12-27T13:13:19","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul>","Lang":"cn"}],"Version":"MPK7825Q"}],"SWKeys":[{"Name":"MZXLR800HBHQ-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR1T6HBJR-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR3T2HBLS-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR6T4HALA-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR12THALA-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR960HBHQ-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR1T9HBJR-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR3T8HBLS-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR7T6HALA-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR15THALA-000H3","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"1a10359b40a9492eab19fc5c24e3bb35"}]},{"ProductId":"849ccbfec2f64038869f4afbe2ecef3d","Versions":[{"DeviceClass":"e7a8b7dd-a6c0-4056-b14a-97bc423ddc7b","Devices":{"Device":[]},"Package":{"Category":[{"Lang":"en","Value":"Software - System Management"},{"Lang":"ja","Value":"ソフトウェア - システム マネジメント"},{"Lang":"cn","Value":"软件 - 系统管理"}],"Description":[{"Lang":"en","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."},{"Lang":"ja","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."},{"Lang":"cn","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Lights Out"},{"Lang":"ja","Value":"Lights Out"},{"Lang":"cn","Value":"Lights Out"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"8679842","DateModified":"2026-02-24T06:36:10","FileList":["./etc/sysconfig/ahslog","./etc/sysconfig/amsd","./etc/sysconfig/amsd_rev","./etc/sysconfig/cpqFca","./etc/sysconfig/cpqFca_rev","./etc/sysconfig/cpqIde","./etc/sysconfig/cpqIde_rev","./etc/sysconfig/cpqiScsi","./etc/sysconfig/smad","./etc/sysconfig/smad_rev","./opt/amsd","./opt/amsd/amsd.license","./sbin/ahslog","./sbin/amscli","./sbin/cpqiScsi","./usr/lib/.build-id","./usr/lib/.build-id/30","./usr/lib/.build-id/30/654d9848672c31a9050d26e9181975c43b37dc","./usr/lib/.build-id/55","./usr/lib/.build-id/55/108fb81a2dbaf6d828fca4e9dd6651a78379d4","./usr/lib/.build-id/55/108fb81a2dbaf6d828fca4e9dd6651a78379d4.1","./usr/lib/.build-id/7d","./usr/lib/.build-id/7d/a075f57d5a6b1e02edabb35a12f63fc6674fb0","./usr/lib/.build-id/7d/a075f57d5a6b1e02edabb35a12f63fc6674fb0.1","./usr/lib/.build-id/88","./usr/lib/.build-id/88/ac1a6d136e90f03a8c61d05168060cc2957e75","./usr/lib/.build-id/ce","./usr/lib/.build-id/ce/573fa413ab3e697955d62ecfdc893426193fbb","./usr/lib/.build-id/ce/573fa413ab3e697955d62ecfdc893426193fbb.1","./usr/lib/.build-id/ed","./usr/lib/.build-id/ed/a606fd8126446d8de0db6dbb539260ff40b392","./usr/lib/.build-id/f5","./usr/lib/.build-id/f5/d4670698dd06fe343246a1218ae856a92f4038","./usr/lib/.build-id/f5/d4670698dd06fe343246a1218ae856a92f4038.1","./usr/lib/systemd/system/ahslog.service","./usr/lib/systemd/system/amsd.service","./usr/lib/systemd/system/amsd_rev.service","./usr/lib/systemd/system/cpqFca.service","./usr/lib/systemd/system/cpqFca_rev.service","./usr/lib/systemd/system/cpqIde.service","./usr/lib/systemd/system/cpqIde_rev.service","./usr/lib/systemd/system/cpqiScsi.service","./usr/lib/systemd/system/smad.service","./usr/lib/systemd/system/smad_rev.service","./usr/lib/udev/rules.d/81-cpqFca.rules","./usr/lib/udev/rules.d/81-cpqiScsi.rules","./usr/share/man/man8/ahslog.8.gz","./usr/share/man/man8/amsd.8.gz","./usr/share/man/man8/cpqFca.8.gz","./usr/share/man/man8/cpqIde.8.gz","./usr/share/man/man8/cpqiScsi.8.gz","./usr/share/man/man8/smad.8.gz","./usr/share/smartupdate/amsd/component.xml","./sbin/amsd","./sbin/amsd_rev","./sbin/cpqFca","./sbin/cpqFca_rev","./sbin/cpqIde","./sbin/cpqIde_rev","./sbin/smad","./sbin/smad_rev"],"MD5Sum":"eb46771ea6802f39b13acd9ac9f6dd7f","Name":"amsd-4.5.0-2120.2.sles16.aarch64.rpm","Release":"2026-02-24T10:26:54","Revision":"","SHA1Sum":"17d70f4bafeb19be00a6b2174f77ca4e30ee2e5d","SHA256Sum":"813040bdaaa4810790883ad85de908965fbc29eabfb0cec9c928633808397a06","Size":"8MB","TargetGUIDs":["20a6e8e4-bf33-4c71-a6bf-d9ecb37bf5ae"],"TypeOfChange":"1","Version":"4.5.0"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{},"PerDeviceInstallTimeSeconds":0,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p>Login as the system administrator (root), download the RPM to a directory on your hard drive and change to that directory.</p><ul><li>To install the package type:<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-&lt;version&gt;.rpm</li></ul></li><li>To check whether the package is loaded properly type:<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>Additional help is available by typing:<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"},{"Lang":"ja","Value":"<p>Login as the system administrator (root), download the RPM to a directory on your hard drive and change to that directory.</p><ul><li>To install the package type:<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-&lt;version&gt;.rpm</li></ul></li><li>To check whether the package is loaded properly type:<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>Additional help is available by typing:<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"},{"Lang":"cn","Value":"<p>Login as the system administrator (root), download the RPM to a directory on your hard drive and change to that directory.</p><ul><li>To install the package type:<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-&lt;version&gt;.rpm</li></ul></li><li>To check whether the package is loaded properly type:<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>Additional help is available by typing:<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Agentless Management Service (iLO 6) for SUSE Linux Enterprise Server 16 for ARM-based Systems"},{"Lang":"ja","Value":"Agentless Management Service (iLO 6) for SUSE Linux Enterprise Server 16 for ARM-based Systems"},{"Lang":"cn","Value":"Agentless Management Service (iLO 6) for SUSE Linux Enterprise Server 16 for ARM-based Systems"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"0"},"SupportedDevices":[{"Id":"2f317b9d-c9e3-4d76-bff6-b9d0d085a952","TargetGUID":"","Type":"other"},{"Id":"2f317b9d-c9e3-4d76-bff6-b9d0d085a952","TargetGUID":"","Type":"other"},{"Dev":"3307","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3307159000e4","Type":"pci","Ven":"103c"},{"Dev":"3306","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3306159000e4","Type":"pci","Ven":"103c"},{"Dev":"3306","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3306159000e4","Type":"pci","Ven":"103C"},{"Dev":"3307","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3307159000e4","Type":"pci","Ven":"103C"}],"SupportedOperatingSystems":[{"Major":"16","Minor":"0","Name":"SUSE Linux Enterprise Server 16 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2026-02-25T00:00:00","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"en"},{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"ja"},{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"cn"}],"Version":"4.5.0"}],"SWKeys":[{"Name":"amsd","SWKeyExpectedPath":"software:rpm"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"Software","UpdatableBy":["RuntimeAgent"],"VersionId":"628dd583e62449b38363bfc028b88532"}]},{"ProductId":"1e88e3b27b814bcdbc8dcf6390d324d1","Versions":[{"DeviceClass":"4149ebb7-d64b-4654-b679-4280f349ea50","Devices":{"Device":[{"DeviceName":"UBM4 Backplane PIC","FirmwareImages":[{"DelayAfterInstallSec":0,"DirectFlashOK":true,"FileName":"HPE_UBM4_1.24_G.HPb","InstallDurationSec":600,"Order":1,"PLDMImage":true,"ResetRequired":false,"ServerPowerOff":false,"SysPowerOn":true,"Type":"Firmware","UEFIFlashable":true}],"Target":"9675b54e-1c96-44c3-a7a1-901504000000","Version":"1.24"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - System"},{"Lang":"ja","Value":"ファームウェア - システム"},{"Lang":"cn","Value":"固件 - 系统 ROM"}],"Description":[{"Lang":"en","Value":"This firmware package contains PLDM firmware for UBM4 storage backplanes."},{"Lang":"ja","Value":"This firmware package contains PLDM firmware for UBM4 storage backplanes."},{"Lang":"cn","Value":"This firmware package contains PLDM firmware for UBM4 storage backplanes."}],"Divisions":[{"Division":[{"Lang":"en","Value":"ServerOptions"},{"Lang":"ja","Value":"サーバ オプション"},{"Lang":"cn","Value":"服务器选项"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"62652","DateModified":"2024-09-13T04:58:18","FileList":["HPE_UBM4_1.24_G.HPb","HPE_UBM4_1.24_G.xml","payload.json"],"MD5Sum":"028965ae0744c5bd9edba939bf775db9","Name":"HPE_UBM4_1.24_G.fwpkg","Release":"2024-09-13T04:53:37","Revision":"G","SHA1Sum":"f08bde255f56cfe95a4cb7cfb0c0c04754b9c24e","SHA256Sum":"21ad95f2ae46d3a5417a5bfa43832a676dde21e588070459bdfa5cf2778c62e1","Size":"61KB","TargetGUIDs":["9675b54e-1c96-44c3-a7a1-901504000000"],"TypeOfChange":"1","Version":"1.24"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":600,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.22.3-4597 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.22.3-4597 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900325","SWKey":"03251590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900382","SWKey":"03821590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.32"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900383","SWKey":"03831590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.32"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002db","SWKey":"02DB1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900381","SWKey":"03811590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f1590032e","SWKey":"032E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900329","SWKey":"03291590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900326","SWKey":"03261590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen10 Plus/Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen10 Plus/Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032b","SWKey":"032B1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR408i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR408i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e2159003c8","SWKey":"03C81590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen10 Plus/Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen10 Plus/Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900293","SWKey":"02931590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900328","SWKey":"03281590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-a Gen10 Plus Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-a Gen10 Plus Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032a","SWKey":"032A1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4650"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032c","SWKey":"032C1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4650"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0651","SWKey":"0651103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.32"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus Controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus Controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002dc","SWKey":"02DC1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus Controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus Controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900294","SWKey":"02941590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p>Flash the PLDM firmware using any below methods</p><ol><li>Flash using iLOrest tool&nbsp;</li><li>Flash using&nbsp;Smart Update Manager (SUM).</li><li>Flash from iLO GUI</li></ol><p>1. To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>&nbsp; &nbsp; localhost OS example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p><p>&nbsp; &nbsp; remote example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO_IP_Address&gt; -u &lt;iLO_username&gt; -p &lt;iLO_password&gt;</em></strong></p><p>2. This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p><p><strong>&nbsp; &nbsp; Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p><ul><li><p>Place the Service Pack for ProLiant on a USB key using the&nbsp;USB Key Creator Utility.</p></li><li><p>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\\packages&quot; on the USB key.</p></li></ul><p>&nbsp; &nbsp; &nbsp;Update the firmware and software&nbsp;in the usual manner.</p><p>3.&nbsp;Flash from iLO GUI</p><ul><li>Browse iLO IP using any browser and login using the credential&nbsp;</li><li>Make sure the PLDM supported adapter is present in the server</li><li>Go to iLO GUI -&gt; Click on &quot;Firmware and OS software&quot; from left side&nbsp;&nbsp;-&gt; Click on &quot;Update Firmware&quot; -&gt; Click on &quot;Choose File&quot; and browse to the supported PLDM file -&gt; Then click on &quot;Flash&quot; button.&nbsp;</li><li>Update status will be show in the Top and a log entry can be seen in Integrated Managenment Log (IML)&nbsp;</li></ul>"},{"Lang":"ja","Value":"<p>Flash the PLDM firmware using any below methods</p><ol><li>Flash using iLOrest tool&nbsp;</li><li>Flash using&nbsp;Smart Update Manager (SUM).</li><li>Flash from iLO GUI</li></ol><p>1. To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>&nbsp; &nbsp; localhost OS example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p><p>&nbsp; &nbsp; remote example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO_IP_Address&gt; -u &lt;iLO_username&gt; -p &lt;iLO_password&gt;</em></strong></p><p>2. This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p><p><strong>&nbsp; &nbsp; Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p><ul><li><p>Place the Service Pack for ProLiant on a USB key using the&nbsp;USB Key Creator Utility.</p></li><li><p>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\\packages&quot; on the USB key.</p></li></ul><p>&nbsp; &nbsp; &nbsp;Update the firmware and software&nbsp;in the usual manner.</p><p>3.&nbsp;Flash from iLO GUI</p><ul><li>Browse iLO IP using any browser and login using the credential&nbsp;</li><li>Make sure the PLDM supported adapter is present in the server</li><li>Go to iLO GUI -&gt; Click on &quot;Firmware and OS software&quot; from left side&nbsp;&nbsp;-&gt; Click on &quot;Update Firmware&quot; -&gt; Click on &quot;Choose File&quot; and browse to the supported PLDM file -&gt; Then click on &quot;Flash&quot; button.&nbsp;</li><li>Update status will be show in the Top and a log entry can be seen in Integrated Managenment Log (IML)&nbsp;</li></ul>"},{"Lang":"cn","Value":"<p>Flash the PLDM firmware using any below methods</p><ol><li>Flash using iLOrest tool&nbsp;</li><li>Flash using&nbsp;Smart Update Manager (SUM).</li><li>Flash from iLO GUI</li></ol><p>1. To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>&nbsp; &nbsp; localhost OS example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p><p>&nbsp; &nbsp; remote example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO_IP_Address&gt; -u &lt;iLO_username&gt; -p &lt;iLO_password&gt;</em></strong></p><p>2. This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p><p><strong>&nbsp; &nbsp; Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p><ul><li><p>Place the Service Pack for ProLiant on a USB key using the&nbsp;USB Key Creator Utility.</p></li><li><p>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\\packages&quot; on the USB key.</p></li></ul><p>&nbsp; &nbsp; &nbsp;Update the firmware and software&nbsp;in the usual manner.</p><p>3.&nbsp;Flash from iLO GUI</p><ul><li>Browse iLO IP using any browser and login using the credential&nbsp;</li><li>Make sure the PLDM supported adapter is present in the server</li><li>Go to iLO GUI -&gt; Click on &quot;Firmware and OS software&quot; from left side&nbsp;&nbsp;-&gt; Click on &quot;Update Firmware&quot; -&gt; Click on &quot;Choose File&quot; and browse to the supported PLDM file -&gt; Then click on &quot;Flash&quot; button.&nbsp;</li><li>Update status will be show in the Top and a log entry can be seen in Integrated Managenment Log (IML)&nbsp;</li></ul>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Firmware Package - UBM4 Backplane PIC PLDM Firmware for Gen10P/Gen11/Gen12 servers usage"},{"Lang":"ja","Value":"Firmware Package - UBM4 Backplane PIC PLDM Firmware for Gen10P/Gen11/Gen12 servers usage"},{"Lang":"cn","Value":"Firmware Package - UBM4 Backplane PIC PLDM Firmware for Gen10P/Gen11/Gen12 servers usage"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"11000"},"SupportedDevices":[{"Id":"9675b54e-1c96-44c3-a7a1-901504000000","TargetGUID":"","Type":"nvmeubmpicnew"}],"SupportedOperatingSystems":[{"Major":"0","Minor":"0","Name":"Cross Operating System","Platform":"oi","Sr":"OEM"},{"Major":"7","Minor":"0","Name":"VMware ESXi 7.0","Platform":"vmware_esx_server","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Microsoft Windows Server 2019","Platform":"nt_x86-64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server","Platform":"red_hat_enterprise_linux_x86_64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15","Platform":"suse_linux_enterprise_server_x86_64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Microsoft Windows Server 2022","Platform":"nt_x86-64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"VMware ESXi 8.0","Platform":"vmware_esx_server","Sr":"OEM"},{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 Server","Platform":"red_hat_enterprise_linux_x86_64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Microsoft Windows Server 2016","Platform":"nt_x86-64","Sr":"OEM"},{"Major":"7","Minor":"0","Name":"Red Hat Enterprise Linux 7 Server","Platform":"red_hat_enterprise_linux_x86_64","Sr":"OEM"},{"Major":"12","Minor":"0","Name":"SUSE Linux Enterprise Server 12","Platform":"suse_linux_enterprise_server_x86_64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Microsoft Windows Server 2025","Platform":"nt_x86-64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2024-10-12T08:36:12","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>For Gen11 PR3 &amp; 2023 March MSB</p>","Fixes":"","Lang":"en"},{"Enhancements":"<p>For Gen11 PR3 &amp; 2023 March MSB</p>","Fixes":"","Lang":"ja"},{"Enhancements":"<p>For Gen11 PR3 &amp; 2023 March MSB</p>","Fixes":"","Lang":"cn"}],"Version":"1.24"},{"ReleaseNotes":[{"Enhancements":"<ul><li>Support Gen12 servers.</li></ul>","Fixes":"","Lang":"en"},{"Enhancements":"<ul><li>Support Gen12 servers.</li></ul>","Fixes":"","Lang":"ja"},{"Enhancements":"<ul><li>Support Gen12 servers.</li></ul>","Fixes":"","Lang":"cn"}],"Version":"1.24"}],"SWKeys":[{"Name":"UBM4PIC","SWKeyExpectedPath":"firmware:sd:ubm"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"I45","Model":"HPE Synergy 480 Gen11 Compute Module"},{"Family":"A55","Model":"HPE ProLiant DL365 Gen11 Server"},{"Family":"A55","Model":"HPE ProLiant DL385 Gen11 Server"},{"Family":"A56","Model":"HPE ProLiant DL345 Gen11 Server"},{"Family":"A56","Model":"HPE ProLiant DL325 Gen11 Server"},{"Family":"U54","Model":"HPE ProLiant DL360 Gen11 Server"},{"Family":"U54","Model":"HPE ProLiant DL380 Gen11 Server"},{"Family":"U63","Model":"HPE ProLiant DL320 Gen11 Server"},{"Family":"U58","Model":"HPE Alletra Storage Server 4120"},{"Family":"U58","Model":"HPE Alletra 4110 Server"},{"Family":"U59","Model":"HPE ProLiant DL560 Gen11 Server"},{"Family":"U46","Model":"HPE ProLiant DL380 Gen10 Plus Server"},{"Family":"A42","Model":"HPE ProLiant DL365 Gen10 Plus Server"},{"Family":"U46","Model":"HPE ProLiant DL360 Gen10 Plus Server"},{"Family":"A43","Model":"HPE ProLiant DL345 Gen10 Plus Server"},{"Family":"A43","Model":"HPE ProLiant DL325 Gen10 Plus v2 Server"},{"Family":"A42","Model":"HPE ProLiant DL385 Gen10 Plus v2 Server"},{"Family":"U46","Model":"HPE ProLiant with vSphere Distributed Services Engine"},{"Family":"U69","Model":"HPE ProLiant Compute DL320 Gen12 SP Server"},{"Family":"U69","Model":"HPE ProLiant Compute DL340 Gen12 SP Server"},{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"U71","Model":"HPE ProLiant Compute DL320 Gen12 Server"},{"Family":"U71","Model":"HPE ProLiant Compute DL340 Gen12 Server"}],"UpgradeRequirements":"Recommended"},"PackageFormat":"FWPKG-v2","Type":"Firmware","UpdatableBy":["Bmc"],"VersionId":"4e14138c4c714237bcc8bfb333533ccd"}]},{"ProductId":"9d7ab7e1a0864ae492695c93cf6cc33f","Versions":[{"DeviceClass":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Devices":{"Device":[{"DeviceName":"MT_0000000575","FirmwareImages":[{"DelayAfterInstallSec":10,"FileName":".//fw-ConnectX6Lx-rel-26_46_3048-MCX631102AS-ADA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","InstallDurationSec":3600,"Order":1,"ResetRequired":true,"Type":"Firmware","UEFIFlashable":false}],"Target":"a6b1a447-382a-5a4f-15b3-101f15b30012","Version":"26.46.3048"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - Network"},{"Lang":"ja","Value":"ファームウェア - ネットワーク"},{"Lang":"cn","Value":"固件 - 网络"}],"Description":[{"Lang":"en","Value":"This package contains the utilities and binary for upgrading HPE MCX631102AS-ADAT Ethernet 10/25Gb 2-port SFP28 Adapter firmware on ARM Linux Operating Systems."},{"Lang":"ja","Value":"このパッケージには、ARM LinuxオペレーティングシステムでHPE MCX631102AS-ADATイーサーネット 10/25Gb 2ポートSFP28アダプターのファームウェアをアップグレードするためのユーティリティとバイナリが含まれています。"},{"Lang":"cn","Value":"This package contains the utilities and binary for upgrading HPE MCX631102AS-ADAT Ethernet 10/25Gb 2-port SFP28 Adapter firmware on ARM Linux Operating Systems."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Networking"},{"Lang":"ja","Value":"ネットワーク"},{"Lang":"cn","Value":"网络"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[{"Lang":"en","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631102AS-ADAT Ethernet 10/25Gb 2-port SFP28 Adapter for HPE&nbsp;(P42044-B21)</td><td>26.46.3048</td><td>MT_0000000575</td></tr></tbody></table>"},{"Lang":"ja","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631102AS-ADAT Ethernet 10/25Gb 2-port SFP28 Adapter for HPE&nbsp;(P42044-B21)</td><td>26.46.3048</td><td>MT_0000000575</td></tr></tbody></table>"},{"Lang":"cn","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631102AS-ADAT Ethernet 10/25Gb 2-port SFP28 Adapter for HPE&nbsp;(P42044-B21)</td><td>26.46.3048</td><td>MT_0000000575</td></tr></tbody></table>"}],"Files":[{"Bytes":"11768684","DateModified":"2026-03-02T02:18:25","FileList":["./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1/CP068332.xml","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1/acpqsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1/cpqsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1/fw-ConnectX6Lx-rel-26_46_3048-MCX631102AS-ADA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1/ilorest_chif.so","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1/mft-4.32.0-120.tgz","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1/mlxfwmanager","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068332.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068332.scexe","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1/hpsetup"],"MD5Sum":"77e2f2ad677b7a0a59fd77379d3cced4","Name":"firmware-nic-mlnx-mcx631102as-adat-26.46.3048-1.1_arm64.deb","Release":"2026-03-02T06:17:04","Revision":"","SHA1Sum":"1b3625a49c8ea23080cc5d536702aeb38e7fa06c","SHA256Sum":"d453469d541b2c63c296ceb27163e1d7d32f1d9002f5b48b36547dc12f5b60ef","Size":"11MB","TargetGUIDs":["a6b1a447-382a-5a4f-15b3-101f15b30012"],"TypeOfChange":"1","Version":"26.46.3048"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"no"},"PerDeviceInstallTimeSeconds":3600,"RebootDetails":[{"Lang":"en","Value":"Reboot is required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要です。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"yes","RebootRequirement":"Required"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the DEB as: dpkg -i &lt;deb_filename&gt;.deb. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: dpkg --remove &lt;deb_package_name&gt;</li></ul><p>&nbsp;</p><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"},{"Lang":"ja","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the DEB as: dpkg -i &lt;deb_filename&gt;.deb. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: dpkg --remove &lt;deb_package_name&gt;</li></ul><p>&nbsp;</p><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"},{"Lang":"cn","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the DEB as: dpkg -i &lt;deb_filename&gt;.deb. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: dpkg --remove &lt;deb_package_name&gt;</li></ul><p>&nbsp;</p><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Mellanox MCX631102AS-ADAT Online Firmware Upgrade Utility for Linux DEB aarch64"},{"Lang":"ja","Value":"Mellanox MCX631102AS-ADATオンラインファームウェアアップグレードユーティリティfor Linux DEB aarch64"},{"Lang":"cn","Value":"Mellanox MCX631102AS-ADAT Online Firmware Upgrade Utility for Linux DEB aarch64"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"1024"},"SupportedDevices":[{"Dev":"101f","SubDev":"0012","SubVen":"15b3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101f15b30012","Type":"pci","Ven":"15b3"},{"Dev":"101E","SubDev":"0012","SubVen":"15B3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101e15b30012","Type":"pci","Ven":"15B3"}],"SupportedOperatingSystems":[{"Major":"20","Minor":"4","Name":"Ubuntu 20.04 LTS","Platform":"ubuntu","Sr":"OEM"},{"Major":"18","Minor":"4","Name":"Ubuntu 18.04","Platform":"Ubuntu","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"},{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-12T08:03:48","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"en"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"ja"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"cn"}],"Version":"26.46.3048"}],"SWKeys":[{"Name":"MT_0000000575","SWKeyExpectedPath":"firmware:nic_mlnx_mcx631102as_adat"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R12","Model":"HPE ProLiant RL340 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"ComboFirmware","UpdatableBy":["RuntimeAgent"],"VersionId":"db5fbf351daa4c8787ab06ffefc145b2"}]},{"ProductId":"97e906834cab4ba1a782cd801a68f13e","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VV003840KXWBF","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"SP54304KHPK8.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3330-3834-304b58574246","Version":"HPK8"},{"DeviceName":"VV007680KXWBL","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"SP54304KHPK8.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3730-3638-304b5857424c","Version":"HPK8"},{"DeviceName":"VV015360KXWBN","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"SP54304KHPK8.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3531-3336-304b5857424e","Version":"HPK8"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: VV003840KXWBF, VV007680KXWBL and VV015360KXWBN"},{"Lang":"ja","Value":"このarm64 Smartコンポーネントは、次のドライブモデルのファームウェアを提供します。VV003840KXWBF、VV007680KXWBL、およびVV015360KXWBN"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux deb (arm64)&nbsp;- VV003840KXWBF, VV007680KXWBL and VV015360KXWBN Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK8</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux deb (arm64)&nbsp;- VV003840KXWBF, VV007680KXWBL and VV015360KXWBN Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK8</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"7628452","DateModified":"2025-11-27T04:39:08","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/CP069849.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/SP54304KHPK8.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP069849.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP069849.scexe"],"MD5Sum":"67012552f18b3330c1627a930678c1d4","Name":"firmware-hdd-48624e387b-0HPK8-1.1_arm64.deb","Release":"2025-11-27T08:36:07","Revision":"","SHA1Sum":"a8eb1051bf22810f4e13cdb8824fd2cee87da3bc","SHA256Sum":"bbf51714af2875beb3101213f481fd473199cdffb4ffff9ab6e75591efbf9b78","Size":"7MB","TargetGUIDs":["562340a5-3056-3330-3834-304b58574246","562340a5-3056-3730-3638-304b5857424c","562340a5-3056-3531-3336-304b5857424e"],"TypeOfChange":"1","Version":"HPK8"}],"Installation":{"Command":"CP043255.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032c","SWKey":"032C1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032b","SWKey":"032B1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032a","SWKey":"032A1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900293","SWKey":"02931590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900383","SWKey":"03831590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900382","SWKey":"03821590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0651","SWKey":"0651103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0650","SWKey":"0650103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0652","SWKey":"0652103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0654","SWKey":"0654103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0700","SWKey":"0700103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0600","SWKey":"0600103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0603","SWKey":"0603103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0602","SWKey":"0602103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0601","SWKey":"0601103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1101","SWKey":"1101103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1100","SWKey":"1100103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900329","SWKey":"03291590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e2159003c8","SWKey":"03C81590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900328","SWKey":"03281590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900326","SWKey":"03261590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002db","SWKey":"02DB1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f1590032e","SWKey":"032E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900381","SWKey":"03811590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900294","SWKey":"02941590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002dc","SWKey":"02DC1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900379","SWKey":"03791590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900380","SWKey":"03801590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-2241159002f6","SWKey":"02F61590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030e","SWKey":"030E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030f","SWKey":"030F1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900310","SWKey":"03101590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900325","SWKey":"03251590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online HDD/SSD Flash Component for Linux deb (arm64) - VV003840KXWBF, VV007680KXWBL and VV015360KXWBN Drives"},{"Lang":"ja","Value":"オンラインHDD/SSDフラッシュコンポーネントfor Linux deb (arm64) - VV003840KXWBF、VV007680KXWBL、およびVV015360KXWBNドライブ"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VV003840KXWBF","TargetGUID":"562340a5-3056-3330-3834-304b58574246","Type":"nvme"},{"Id":"VV007680KXWBL","TargetGUID":"562340a5-3056-3730-3638-304b5857424c","Type":"nvme"},{"Id":"VV015360KXWBN","TargetGUID":"562340a5-3056-3531-3336-304b5857424e","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-12-27T06:35:36","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>HPK8 is a planned maintenance release that follows HPK5. This is a recommended FW release that&nbsp;provides bug fixes for the P5430 15.36T, 7.68T, 3.84T (4K IU) Solid State Drives.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>HPK8 is a planned maintenance release that follows HPK5. This is a recommended FW release that&nbsp;provides bug fixes for the P5430 15.36T, 7.68T, 3.84T (4K IU) Solid State Drives.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>HPK8 is a planned maintenance release that follows HPK5. This is a recommended FW release that&nbsp;provides bug fixes for the P5430 15.36T, 7.68T, 3.84T (4K IU) Solid State Drives.</li></ul>","Lang":"cn"}],"Version":"HPK8"}],"SWKeys":[{"Name":"VV003840KXWBF","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV007680KXWBL","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV015360KXWBN","SWKeyExpectedPath":"firmware:sd:nvme"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"f027463e4b3545dba38e1b27c694a2a9"}]},{"ProductId":"0f94591dabb6464d99018351342dc4f4","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"MV003200LYJKH","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7AEFHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3330-3230-304c594a4b48","Version":"HPK4"},{"DeviceName":"MV006400LYJKK","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7AEFHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3630-3430-304c594a4b4b","Version":"HPK4"},{"DeviceName":"VV007680LYJKF","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7AEFHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3730-3638-304c594a4b46","Version":"HPK4"},{"DeviceName":"VV015360LYXMT","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7AEFHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3531-3336-304c59584d54","Version":"HPK4"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive model: MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive model: MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK4</p><p><br />&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK4</p><p><br />&nbsp;</p>"}],"Files":[{"Bytes":"5657641","DateModified":"2025-10-13T05:07:14","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/CP068512.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/KACM7AEFHPK4.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068512.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068512.scexe"],"MD5Sum":"8e3d18619feea61e4d4829730d67464f","Name":"firmware-hdd-03eeb5f134-HPK4-1.1.aarch64.rpm","Release":"2025-10-13T08:58:52","Revision":"","SHA1Sum":"6ec760e4001c9b37696aed8670087eb451863e18","SHA256Sum":"948a1104bd18a5f9226ee3181249b6d2dfc9810530d7548092793de9366feca5","Size":"5MB","TargetGUIDs":["4d2340a5-3056-3330-3230-304c594a4b48","4d2340a5-3056-3630-3430-304c594a4b4b","562340a5-3056-3730-3638-304c594a4b46","562340a5-3056-3531-3336-304c59584d54"],"TypeOfChange":"1","Version":"HPK4"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux (arm64) - MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux (arm64) - MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"MV003200LYJKH","TargetGUID":"4d2340a5-3056-3330-3230-304c594a4b48","Type":"nvme"},{"Id":"MV006400LYJKK","TargetGUID":"4d2340a5-3056-3630-3430-304c594a4b4b","Type":"nvme"},{"Id":"VV007680LYJKF","TargetGUID":"562340a5-3056-3730-3638-304c594a4b46","Type":"nvme"},{"Id":"VV015360LYXMT","TargetGUID":"562340a5-3056-3531-3336-304c59584d54","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-24T22:15:07","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance release for sanitize, DRAM,DMA transfer and log page fix.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance release for sanitize, DRAM,DMA transfer and log page fix.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance release for sanitize, DRAM,DMA transfer and log page fix.</li></ul>","Lang":"cn"}],"Version":"HPK4"}],"SWKeys":[{"Name":"MV003200LYJKH","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MV006400LYJKK","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VV007680LYJKF","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VV015360LYXMT","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"2db7f8123a3e4394bd8564ab19b304ef"}]},{"ProductId":"237b5ef4fc4d43f7aeff9d6a4e428973","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"MV001600LYCBT","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3130-3630-304c59434254","Version":"HPK3"},{"DeviceName":"MV003200LYCBA","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3330-3230-304c59434241","Version":"HPK3"},{"DeviceName":"MV006400LYCBB","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3630-3430-304c59434242","Version":"HPK3"},{"DeviceName":"VV015360LYHDC","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3531-3336-304c59484443","Version":"HPK3"},{"DeviceName":"VV001920LYCBR","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3130-3932-304c59434252","Version":"HPK3"},{"DeviceName":"VV003840LYCAU","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3330-3834-304c59434155","Version":"HPK3"},{"DeviceName":"VV007680LYCAV","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3730-3638-304c59434156","Version":"HPK3"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive models: MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK3</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK3</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"9847228","DateModified":"2025-08-24T09:43:17","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/CP068503.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/KACD8ALEHPK3.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068503.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068503.scexe"],"MD5Sum":"04e38b963f89d0caa6f8a4dc6343fc61","Name":"firmware-hdd-52215d9185-0HPK3-1.1_arm64.deb","Release":"2025-08-24T13:40:04","Revision":"","SHA1Sum":"2fa62729dfcfcefd41f26f9e07c92e4e556d4514","SHA256Sum":"1220182d0256daecf3e9585f3d4071fb4600259ce442fc837692afb9822985a3","Size":"9MB","TargetGUIDs":["4d2340a5-3056-3130-3630-304c59434254","4d2340a5-3056-3330-3230-304c59434241","4d2340a5-3056-3630-3430-304c59434242","562340a5-3056-3531-3336-304c59484443","562340a5-3056-3130-3932-304c59434252","562340a5-3056-3330-3834-304c59434155","562340a5-3056-3730-3638-304c59434156"],"TypeOfChange":"1","Version":"HPK3"}],"Installation":{"Command":"CP043255.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032c","SWKey":"032C1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032b","SWKey":"032B1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032a","SWKey":"032A1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900293","SWKey":"02931590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900383","SWKey":"03831590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900382","SWKey":"03821590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0651","SWKey":"0651103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0650","SWKey":"0650103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0652","SWKey":"0652103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0654","SWKey":"0654103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0700","SWKey":"0700103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0600","SWKey":"0600103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0603","SWKey":"0603103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0602","SWKey":"0602103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0601","SWKey":"0601103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1101","SWKey":"1101103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1100","SWKey":"1100103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900329","SWKey":"03291590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e2159003c8","SWKey":"03C81590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900328","SWKey":"03281590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900326","SWKey":"03261590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002db","SWKey":"02DB1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f1590032e","SWKey":"032E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900381","SWKey":"03811590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900294","SWKey":"02941590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002dc","SWKey":"02DC1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900379","SWKey":"03791590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900380","SWKey":"03801590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-2241159002f6","SWKey":"02F61590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030e","SWKey":"030E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030f","SWKey":"030F1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900310","SWKey":"03101590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900325","SWKey":"03251590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online HDD/SSD Flash Component for Linux deb (arm64) - MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV Drives"},{"Lang":"ja","Value":"Online HDD/SSD Flash Component for Linux deb (arm64) - MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV Drives"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VV007680LYCAV","TargetGUID":"562340a5-3056-3730-3638-304c59434156","Type":"nvme"},{"Id":"VV003840LYCAU","TargetGUID":"562340a5-3056-3330-3834-304c59434155","Type":"nvme"},{"Id":"VV001920LYCBR","TargetGUID":"562340a5-3056-3130-3932-304c59434252","Type":"nvme"},{"Id":"MV006400LYCBB","TargetGUID":"4d2340a5-3056-3630-3430-304c59434242","Type":"nvme"},{"Id":"MV003200LYCBA","TargetGUID":"4d2340a5-3056-3330-3230-304c59434241","Type":"nvme"},{"Id":"MV001600LYCBT","TargetGUID":"4d2340a5-3056-3130-3630-304c59434254","Type":"nvme"},{"Id":"VV015360LYHDC","TargetGUID":"562340a5-3056-3531-3336-304c59484443","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-22T12:33:06","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>The FW address: PCIe link drop and 0ther regular FW patches release.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>The FW address: PCIe link drop and 0ther regular FW patches release.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>The FW address: PCIe link drop and 0ther regular FW patches release.</li></ul>","Lang":"cn"}],"Version":"HPK3"}],"SWKeys":[{"Name":"MV001600LYCBT","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"MV003200LYCBA","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"MV006400LYCBB","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV015360LYHDC","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV001920LYCBR","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV003840LYCAU","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV007680LYCAV","SWKeyExpectedPath":"firmware:sd:nvme"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"1ef773fafa694d21b2ee2e6a310ffd62"}]},{"ProductId":"1a5a8816744647e1adc4c7f37f0024e1","Versions":[{"DeviceClass":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Devices":{"Device":[{"DeviceName":"MT_0000000575","FirmwareImages":[{"DelayAfterInstallSec":10,"FileName":".//fw-ConnectX6Lx-rel-26_46_3048-MCX631102AS-ADA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","InstallDurationSec":360,"Order":1,"ResetRequired":true,"Type":"Firmware","UEFIFlashable":false}],"Target":"a6b1a447-382a-5a4f-15b3-101f15b30012","Version":"26.46.3048"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - Network"},{"Lang":"ja","Value":"ファームウェア - ネットワーク"},{"Lang":"cn","Value":"固件 - 网络"}],"Description":[{"Lang":"en","Value":"This package contains the utilities and binary for upgrading HPE MCX631102AS-ADAT Ethernet 10/25Gb 2-port SFP28 Adapter firmware on ARM Linux Operating Systems."},{"Lang":"ja","Value":"このパッケージには、ARM LinuxオペレーティングシステムでHPE MCX631102AS-ADATイーサーネット 10/25Gb 2ポートSFP28アダプターのファームウェアをアップグレードするためのユーティリティとバイナリが含まれています。"},{"Lang":"cn","Value":"This package contains the utilities and binary for upgrading HPE MCX631102AS-ADAT Ethernet 10/25Gb 2-port SFP28 Adapter firmware on ARM Linux Operating Systems."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Networking"},{"Lang":"ja","Value":"ネットワーク"},{"Lang":"cn","Value":"网络"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[{"Lang":"en","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631102AS-ADAT Ethernet 10/25Gb 2-port SFP28 Adapter for HPE&nbsp;(P42044-B21)</td><td>26.46.3048</td><td>MT_0000000575</td></tr></tbody></table>"},{"Lang":"ja","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631102AS-ADAT Ethernet 10/25Gb 2-port SFP28 Adapter for HPE&nbsp;(P42044-B21)</td><td>26.46.3048</td><td>MT_0000000575</td></tr></tbody></table>"},{"Lang":"cn","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631102AS-ADAT Ethernet 10/25Gb 2-port SFP28 Adapter for HPE&nbsp;(P42044-B21)</td><td>26.46.3048</td><td>MT_0000000575</td></tr></tbody></table>"}],"Files":[{"Bytes":"23341142","DateModified":"2026-02-05T04:12:08","FileList":["./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/CP068333.xml","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/acpqsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/binx.tgz","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/fw-ConnectX6Lx-rel-26_46_3048-MCX631102AS-ADA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/ilorest_chif.so","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/mft-4.32.0-120.tgz","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/mlxfwmanager","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068333.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068333.scexe"],"MD5Sum":"63c411529975944030a221935f0cc21d","Name":"firmware-nic-mlnx-mcx631102as-adat-mt-0000000575-26.46.3048-1.1.aarch64.rpm","Release":"2026-02-05T08:02:04","Revision":"","SHA1Sum":"5c708054eb59aad286230e092c74a49fc1af9c46","SHA256Sum":"48a586fb33d815ffc2b3fdbe89b2e44663ef6bbe42382cd7e8572e8339243a7e","Size":"22MB","TargetGUIDs":["a6b1a447-382a-5a4f-15b3-101f15b30012"],"TypeOfChange":"1","Version":"26.46.3048"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"no"},"PerDeviceInstallTimeSeconds":360,"RebootDetails":[{"Lang":"en","Value":"Reboot is required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要です。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"yes","RebootRequirement":"Required"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>pdating firmware with rpm installed:</strong></p><ul><li>Install the RPM as: rpm -ivh &lt;rpm_filename&gt;.rpm. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: rpm -e &lt;rpm_package_name&gt;</li></ul><p><strong>Updating firmware without installing rpm:</strong></p><ul><li>Extract the contents of the rpm as: rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id</li><li>This will extract the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>From the terminal, navigate to &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run &quot; ./CPxxxxxx.scexe&quot;&quot; to update the firmware. The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed.</li></ul><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"},{"Lang":"ja","Value":"<p><strong>pdating firmware with rpm installed:</strong></p><ul><li>Install the RPM as: rpm -ivh &lt;rpm_filename&gt;.rpm. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: rpm -e &lt;rpm_package_name&gt;</li></ul><p><strong>Updating firmware without installing rpm:</strong></p><ul><li>Extract the contents of the rpm as: rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id</li><li>This will extract the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>From the terminal, navigate to &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run &quot; ./CPxxxxxx.scexe&quot;&quot; to update the firmware. The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed.</li></ul><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"},{"Lang":"cn","Value":"<p><strong>pdating firmware with rpm installed:</strong></p><ul><li>Install the RPM as: rpm -ivh &lt;rpm_filename&gt;.rpm. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed).</li><li>To uninstall, run: rpm -e &lt;rpm_package_name&gt;</li></ul><p><strong>Updating firmware without installing rpm:</strong></p><ul><li>Extract the contents of the rpm as: rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id</li><li>This will extract the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>From the terminal, navigate to &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run &quot; ./CPxxxxxx.scexe&quot;&quot; to update the firmware. The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the rpm installed.</li></ul><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Mellanox MCX631102AS-ADAT Online Firmware Upgrade Utility for Linux RPM aarch64"},{"Lang":"ja","Value":"Mellanox MCX631102AS-ADATオンラインファームウェアアップグレードユーティリティfor Linux RPM aarch64"},{"Lang":"cn","Value":"Mellanox MCX631102AS-ADAT Online Firmware Upgrade Utility for Linux RPM aarch64"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"1024"},"SupportedDevices":[{"Dev":"101f","SubDev":"0012","SubVen":"15b3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101f15b30012","Type":"pci","Ven":"15b3"},{"Dev":"101E","SubDev":"0012","SubVen":"15B3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101e15b30012","Type":"pci","Ven":"15B3"}],"SupportedOperatingSystems":[{"Major":"7","Minor":"0","Name":"Red Hat Enterprise Linux 7 Server for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-12T08:03:49","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"en"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"ja"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul><p>&nbsp;</p><p>&nbsp;</p>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"cn"}],"Version":"26.46.3048"}],"SWKeys":[{"Name":"MT_0000000575","SWKeyExpectedPath":"firmware:nic_mlnx_mcx631102as_adat"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R12","Model":"HPE ProLiant RL340 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"ComboFirmware","UpdatableBy":["RuntimeAgent"],"VersionId":"7e43662a20e64cf298533ba031da2d4f"}]},{"ProductId":"8b4188fdc6af4b38af0e648893f8fe63","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"MV001600LYCBT","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3130-3630-304c59434254","Version":"HPK3"},{"DeviceName":"MV003200LYCBA","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3330-3230-304c59434241","Version":"HPK3"},{"DeviceName":"MV006400LYCBB","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3630-3430-304c59434242","Version":"HPK3"},{"DeviceName":"VV015360LYHDC","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3531-3336-304c59484443","Version":"HPK3"},{"DeviceName":"VV001920LYCBR","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3130-3932-304c59434252","Version":"HPK3"},{"DeviceName":"VV003840LYCAU","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3330-3834-304c59434155","Version":"HPK3"},{"DeviceName":"VV007680LYCAV","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACD8ALEHPK3.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3730-3638-304c59434156","Version":"HPK3"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive models: MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK3</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK3</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"5530883","DateModified":"2025-10-13T03:09:41","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/CP068502.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/KACD8ALEHPK3.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-52215d9185-HPK3-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068502.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068502.scexe"],"MD5Sum":"3c2a603fc281c21ba90a593de83c0212","Name":"firmware-hdd-52215d9185-HPK3-1.1.aarch64.rpm","Release":"2025-10-13T07:01:23","Revision":"","SHA1Sum":"f630d019e268d8efabaa983dabb17e730ec4564c","SHA256Sum":"ea5d905ddae20cfbc1308f168e21bdd4199aa29f1540b83809b83e5621731e5d","Size":"5MB","TargetGUIDs":["4d2340a5-3056-3130-3630-304c59434254","4d2340a5-3056-3330-3230-304c59434241","4d2340a5-3056-3630-3430-304c59434242","562340a5-3056-3531-3336-304c59484443","562340a5-3056-3130-3932-304c59434252","562340a5-3056-3330-3834-304c59434155","562340a5-3056-3730-3638-304c59434156"],"TypeOfChange":"1","Version":"HPK3"}],"Installation":{"Command":"CP043255.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032c","SWKey":"032C1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032b","SWKey":"032B1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032a","SWKey":"032A1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900293","SWKey":"02931590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900383","SWKey":"03831590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900382","SWKey":"03821590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0651","SWKey":"0651103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0650","SWKey":"0650103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0652","SWKey":"0652103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0654","SWKey":"0654103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0700","SWKey":"0700103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0600","SWKey":"0600103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0603","SWKey":"0603103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0602","SWKey":"0602103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0601","SWKey":"0601103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1101","SWKey":"1101103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1100","SWKey":"1100103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900329","SWKey":"03291590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e2159003c8","SWKey":"03C81590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900328","SWKey":"03281590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900326","SWKey":"03261590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002db","SWKey":"02DB1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f1590032e","SWKey":"032E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900381","SWKey":"03811590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900294","SWKey":"02941590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002dc","SWKey":"02DC1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900379","SWKey":"03791590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900380","SWKey":"03801590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-2241159002f6","SWKey":"02F61590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030e","SWKey":"030E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030f","SWKey":"030F1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900310","SWKey":"03101590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900325","SWKey":"03251590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online HDD/SSD Flash Component for Linux (arm64) - MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV Drives"},{"Lang":"ja","Value":"Online HDD/SSD Flash Component for Linux (arm64) - MV001600LYCBT, MV003200LYCBA, MV006400LYCBB, VV015360LYHDC, VV001920LYCBR, VV003840LYCAU and VV007680LYCAV Drives"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VV007680LYCAV","TargetGUID":"562340a5-3056-3730-3638-304c59434156","Type":"nvme"},{"Id":"VV003840LYCAU","TargetGUID":"562340a5-3056-3330-3834-304c59434155","Type":"nvme"},{"Id":"VV001920LYCBR","TargetGUID":"562340a5-3056-3130-3932-304c59434252","Type":"nvme"},{"Id":"MV006400LYCBB","TargetGUID":"4d2340a5-3056-3630-3430-304c59434242","Type":"nvme"},{"Id":"MV003200LYCBA","TargetGUID":"4d2340a5-3056-3330-3230-304c59434241","Type":"nvme"},{"Id":"MV001600LYCBT","TargetGUID":"4d2340a5-3056-3130-3630-304c59434254","Type":"nvme"},{"Id":"VV015360LYHDC","TargetGUID":"562340a5-3056-3531-3336-304c59484443","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-22T12:32:56","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>The FW address: PCIe link drop and 0ther regular FW patches release.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>The FW address: PCIe link drop and 0ther regular FW patches release.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>The FW address: PCIe link drop and 0ther regular FW patches release.</li></ul>","Lang":"cn"}],"Version":"HPK3"}],"SWKeys":[{"Name":"MV001600LYCBT","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"MV003200LYCBA","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"MV006400LYCBB","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV015360LYHDC","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV001920LYCBR","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV003840LYCAU","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV007680LYCAV","SWKeyExpectedPath":"firmware:sd:nvme"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"6b9c66664a16453d9f2571b3da667fcc"}]},{"ProductId":"269c16a027cf4615b11236eebd3bee15","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VV003840KXWBF","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"SP54304KHPK8.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3330-3834-304b58574246","Version":"HPK8"},{"DeviceName":"VV007680KXWBL","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"SP54304KHPK8.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3730-3638-304b5857424c","Version":"HPK8"},{"DeviceName":"VV015360KXWBN","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"SP54304KHPK8.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3531-3336-304b5857424e","Version":"HPK8"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: VV003840KXWBF, VV007680KXWBL and VV015360KXWBN"},{"Lang":"ja","Value":"このarm64 Smartコンポーネントは、次のドライブモデルのファームウェアを提供します。VV003840KXWBF、VV007680KXWBL、およびVV015360KXWBN"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- VV003840KXWBF, VV007680KXWBL and VV015360KXWBN Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK8</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- VV003840KXWBF, VV007680KXWBL and VV015360KXWBN Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK8</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"4458096","DateModified":"2025-11-27T04:34:17","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/CP069848.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/SP54304KHPK8.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-48624e387b-HPK8-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP069848.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP069848.scexe"],"MD5Sum":"e0cd5384ff10c7a2fb327e64f63c57bf","Name":"firmware-hdd-48624e387b-HPK8-1.1.aarch64.rpm","Release":"2025-11-27T08:26:07","Revision":"","SHA1Sum":"5d21d09d4fa1ef4b0559555cf80eadc3e962487a","SHA256Sum":"49640a951ef006039b8ed896b0db18c4984000c22ee275dc1d2a522836ea52d0","Size":"4MB","TargetGUIDs":["562340a5-3056-3330-3834-304b58574246","562340a5-3056-3730-3638-304b5857424c","562340a5-3056-3531-3336-304b5857424e"],"TypeOfChange":"1","Version":"HPK8"}],"Installation":{"Command":"CP043255.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032c","SWKey":"032C1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032b","SWKey":"032B1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032a","SWKey":"032A1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900293","SWKey":"02931590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900383","SWKey":"03831590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900382","SWKey":"03821590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0651","SWKey":"0651103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0650","SWKey":"0650103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0652","SWKey":"0652103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0654","SWKey":"0654103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0700","SWKey":"0700103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0600","SWKey":"0600103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0603","SWKey":"0603103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0602","SWKey":"0602103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0601","SWKey":"0601103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1101","SWKey":"1101103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1100","SWKey":"1100103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900329","SWKey":"03291590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e2159003c8","SWKey":"03C81590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900328","SWKey":"03281590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900326","SWKey":"03261590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002db","SWKey":"02DB1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f1590032e","SWKey":"032E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900381","SWKey":"03811590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900294","SWKey":"02941590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002dc","SWKey":"02DC1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900379","SWKey":"03791590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900380","SWKey":"03801590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-2241159002f6","SWKey":"02F61590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030e","SWKey":"030E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030f","SWKey":"030F1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900310","SWKey":"03101590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900325","SWKey":"03251590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online HDD/SSD Flash Component for Linux (arm64) - VV003840KXWBF, VV007680KXWBL and VV015360KXWBN Drives"},{"Lang":"ja","Value":"オンラインHDD/SSDフラッシュコンポーネントfor Linux (arm64) - VV003840KXWBF、VV007680KXWBL、およびVV015360KXWBNドライブ"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VV003840KXWBF","TargetGUID":"562340a5-3056-3330-3834-304b58574246","Type":"nvme"},{"Id":"VV007680KXWBL","TargetGUID":"562340a5-3056-3730-3638-304b5857424c","Type":"nvme"},{"Id":"VV015360KXWBN","TargetGUID":"562340a5-3056-3531-3336-304b5857424e","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-12-27T06:35:30","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>HPK8 is a planned maintenance release that follows HPK5. This is a recommended FW release that&nbsp;provides bug fixes for the P5430 15.36T, 7.68T, 3.84T (4K IU) Solid State Drives.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>HPK8 is a planned maintenance release that follows HPK5. This is a recommended FW release that&nbsp;provides bug fixes for the P5430 15.36T, 7.68T, 3.84T (4K IU) Solid State Drives.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>HPK8 is a planned maintenance release that follows HPK5. This is a recommended FW release that&nbsp;provides bug fixes for the P5430 15.36T, 7.68T, 3.84T (4K IU) Solid State Drives.</li></ul>","Lang":"cn"}],"Version":"HPK8"}],"SWKeys":[{"Name":"VV003840KXWBF","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV007680KXWBL","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV015360KXWBN","SWKeyExpectedPath":"firmware:sd:nvme"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"93f261d175344785b1dbc6cdbc93dc01"}]},{"ProductId":"994a0b6ce04a44b9b4daabf9aed11e4c","Versions":[{"DeviceClass":"2f317b9d-c9e3-4d76-bff6-b9d0d085a952","Devices":{"Device":[{"DeviceName":"iLO 6","FirmwareImages":[{"DelayAfterInstallSec":120,"DirectFlashOK":true,"FileName":"ilo6_174.bin","InstallDurationSec":600,"Order":1,"PLDMImage":false,"ResetRequired":false,"ServerPowerOff":false,"SysPowerOn":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"e6d3c844-14a6-4f1f-84a3-c06013910406","Version":"1.74"},{"DeviceName":"iLO 6","FirmwareImages":[{"DelayAfterInstallSec":120,"DirectFlashOK":true,"FileName":"ilo6_174.bin","InstallDurationSec":600,"Order":1,"PLDMImage":false,"ResetRequired":false,"ServerPowerOff":false,"SysPowerOn":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"e6d3c844-14a6-4f1f-84a3-c06013910306","Version":"1.74"},{"DeviceName":"iLO 6","FirmwareImages":[{"DelayAfterInstallSec":120,"DirectFlashOK":true,"FileName":"ilo6_174.bin","InstallDurationSec":600,"Order":1,"PLDMImage":false,"ResetRequired":false,"ServerPowerOff":false,"SysPowerOn":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"e6d3c844-14a6-4f1f-84a3-c06013910206","Version":"1.74"},{"DeviceName":"iLO 6","FirmwareImages":[{"DelayAfterInstallSec":120,"DirectFlashOK":true,"FileName":"ilo6_174.bin","InstallDurationSec":600,"Order":1,"PLDMImage":false,"ResetRequired":false,"ServerPowerOff":false,"SysPowerOn":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"e6d3c844-14a6-4f1f-84a3-c06013910106","Version":"1.74"},{"DeviceName":"iLO 6","FirmwareImages":[{"DelayAfterInstallSec":120,"DirectFlashOK":true,"FileName":"ilo6_174.bin","InstallDurationSec":600,"Order":1,"PLDMImage":false,"ResetRequired":false,"ServerPowerOff":false,"SysPowerOn":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"e6d3c844-14a6-4f1f-84a3-c06013910006","Version":"1.74"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - Lights-Out Management"},{"Lang":"ja","Value":"ファームウェア - Lights-Outマネジメント"},{"Lang":"cn","Value":"固件 - Lights-Out Management"}],"Description":[{"Lang":"en","Value":"This component provides updated iLO firmware that can be installed directly on supported Operating Systems. This component can also be used to obtain the firmware image for updating via iLO user interface, utilities, or through the scripting interface. Additionally, this component can be used with the Smart Update Manager."},{"Lang":"ja","Value":"このコンポーネントは、サポートされるオペレーティングシステムに直接インストール可能なアップデートされたiLOファームウェアを提供します。このコンポーネントは、iLOユーザーインターフェイス、ユーティリティ、またはスクリプティングインターフェイスからファームウェアイメージのアップデートを入手するために使用することができます。さらに、Smart Update Managerと一緒に使用することができます。"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Lights Out"},{"Lang":"ja","Value":"Lights Out"},{"Lang":"cn","Value":"Lights Out"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[{"Lang":"en","Value":"<p>&nbsp;</p><p>iLO 6&nbsp;User Guide and Lights-Out Scripting Guide can also be found by following the links at:<br /><br /><a href=\"http://www.hpe.com/info/ilo-docs\">http://www.hpe.com/info/ilo-docs</a><br /><br />Select your lights-out product, then support &amp; documents, then manuals.</p><ul><li>Check the online help for additional information about how to use features.&nbsp;<br />Online help can be accessed from within the browser web pages by clicking the question mark in the upper right-hand corner of each page.</li></ul>"},{"Lang":"ja","Value":"<p>&nbsp;</p><p>iLO 6&nbsp;User Guide and Lights-Out Scripting Guide can also be found by following the links at:<br /><br /><a href=\"http://www.hpe.com/info/ilo-docs\">http://www.hpe.com/info/ilo-docs</a><br /><br />Select your lights-out product, then support &amp; documents, then manuals.</p><ul><li>Check the online help for additional information about how to use features.&nbsp;<br />Online help can be accessed from within the browser web pages by clicking the question mark in the upper right-hand corner of each page.</li></ul>"}],"Files":[{"Bytes":"33586521","DateModified":"2026-01-29T08:30:04","FileList":["ilo6_174.bin","ilo6_174.xml","payload.json","readme.txt"],"MD5Sum":"cbd45a19e3766871c067473d497456a3","Name":"ilo6_174.fwpkg","Release":"2026-01-29T08:26:49","Revision":"","SHA1Sum":"6cb60367885c96671a5c9540e8128c1aed55838f","SHA256Sum":"1d7efee28ae66a421af3dff14ce0382fa72bc02e0aab586bd23e2d690ffde8af","Size":"32MB","TargetGUIDs":["e6d3c844-14a6-4f1f-84a3-c06013910406","e6d3c844-14a6-4f1f-84a3-c06013910306","e6d3c844-14a6-4f1f-84a3-c06013910206","e6d3c844-14a6-4f1f-84a3-c06013910106","e6d3c844-14a6-4f1f-84a3-c06013910006"],"TypeOfChange":"1","Version":"1.74"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"no"},"PerDeviceInstallTimeSeconds":600,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p>To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"http://www.hpe.com/servers/resttool\" target=\"_blank\">http://www.hpe.com/servers/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>localhost OS example:<br /><strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p><p>remote example:<br /><strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO6_IP_Address&gt; -u &lt;iLO6_username&gt; -p &lt;iLO6_password&gt;</em></strong></p><p>This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p><p><strong>Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using SUM, which is found on the&nbsp;<strong><a href=\"http://www.hpe.com/info/spp\" target=\"_blank\">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p><ul><li>Place the Service Pack for ProLiant on a USB key using the&nbsp;<strong><a href=\"https://support.hpe.com/hpesc/public/home/driverHome?pmasr=0&amp;sp4ts.oid=1008862658\" target=\"_blank\">USB Key Creator Utility</a></strong>.</li><li>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\\packages&quot; on the USB key.</li></ul><p>Update the firmware and software&nbsp;in the usual manner.</p>"},{"Lang":"ja","Value":"<p>To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"http://www.hpe.com/servers/resttool\" target=\"_blank\">http://www.hpe.com/servers/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>localhost OS example:<br /><strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p><p>remote example:<br /><strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO6_IP_Address&gt; -u &lt;iLO6_username&gt; -p &lt;iLO6_password&gt;</em></strong></p><p>This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p><p><strong>Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using SUM, which is found on the&nbsp;<strong><a href=\"http://www.hpe.com/info/spp\" target=\"_blank\">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p><ul><li>Place the Service Pack for ProLiant on a USB key using the&nbsp;<strong><a href=\"https://support.hpe.com/hpesc/public/home/driverHome?pmasr=0&amp;sp4ts.oid=1008862658\" target=\"_blank\">USB Key Creator Utility</a></strong>.</li><li>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\\packages&quot; on the USB key.</li></ul><p>Update the firmware and software&nbsp;in the usual manner.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online ROM Flash Firmware Package - HPE Integrated Lights-Out 6"},{"Lang":"ja","Value":"オンラインROMフラッシュファームウェアパッケージ - HPE Integrated Lights-Out 6"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"70000"},"SupportedDevices":[{"Id":"2f317b9d-c9e3-4d76-bff6-b9d0d085a952","TargetGUID":"","Type":"other"},{"Dev":"3307","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3307159000e4","Type":"pci","Ven":"103c"},{"Dev":"3306","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3306159000e4","Type":"pci","Ven":"103c"}],"SupportedOperatingSystems":[{"Major":"0","Minor":"0","Name":"Cross Operating System","Platform":"oi","Sr":"OEM"},{"Major":"7","Minor":"0","Name":"VMware ESXi 7.0","Platform":"vmware_esx_server","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"VMware ESXi 8.0","Platform":"vmware_esx_server","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2026-01-15T05:21:59","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>&bull; Enabled the replacement of the power-sensor property PowerCapacityWatts with Reading and adding the ReadingUnits property for Rinline server.<br />&bull; Support for certificate management and enhanced measurements for SPDM devices through HPE iLO GUI on HPE ProLiant Gen 11 servers.<br />&bull; Enabled VSP by default.<br />&bull; Support to report system energy consumption counter for ML/DL servers.<br />&bull; Support for Key Management Interoperability Protocol (KMIP) remote key management method for ESKM server.</p>","Fixes":"<p>&bull; Fixed an issue where the Component Integrity Policy menu was not grayed out with an unselected Global Component Integrity option set.<br />&bull; Fixed the empty message arguments that were reported with AggregateHealthStatusChange event while reading HPE iLO events using /redfish/v1/Systems/1/LogServices/Event/Entries.<br />&bull; Fixed an issue where HPE iLO failed to report InPostDiscoveryComplete even after server boot is completed.<br />&bull; Fixed an issue where an HPE iLO 6 user with insufficient privilege was still able to run VSP commands.<br />&bull; Fixed an issue where HPE iLO SNMP became unresponsive when SNMPWALK ran in parallel from multiple consoles.<br />&bull; Fixed an issue with SNMP failed to display a proper output when storage condition is failed.<br />&bull; Fixed an issue where a user was unable to update the SSD firmware for HPE ProLiant DL365 Gen11 server using HPE iLO.<br />&bull; Fixed the SNMP OID cpqHeMibCondition to include and account for the Storage subsystem health condition.</p>","Lang":"en"},{"Enhancements":"<p>• 電源センサープロパティPowerCapacityWattsを、RinlineサーバーのReadingUnitsプロパティの読み取りと追加によって置換できるようにしました。<br />• HPE ProLiant Gen 11サーバー上のHPE iLO GUIによるSPDMデバイスの証明書管理と機能強化された測定のサポート。<br />• デフォルトでVSPが有効になりました。<br />• ML/DLサーバーのシステムエネルギー消費カウンターをレポートするようにサポートします。<br />• ESKMサーバーのKMIP (Key Management Interoperability Protocol) リモートキー管理方式のサポート。</p>","Fixes":"<p>• 選択されていないグローバルコンポーネントの完全性オプションセットで、コンポーネントの完全性ポリシーメニューがグレー表示にならない問題を修正しました。<br />• /redfish/v1/Systems/1/LogServices/Event/Entriesを使用したHPE iLOイベントの読み取り中に、AggregateHealthStatusChangeイベントで報告されていた空のメッセージ引数を修正しました。<br />• サーバーブートが完了した後でも、HPE iLOがInPostDiscoveryCompleteを報告できない問題を修正しました。<br />•権限が不十分なHPE iLO 6ユーザーがまだVSPコマンドを実行できる問題を修正しました。<br />• 複数のコンソールからSNMPWALKを並列で実行すると、HPE iLO SNMPが応答しなくなる問題を修正しました。<br />• ストレージ条件が失敗した場合にSNMPが適切な出力を表示できない問題を修正しました。<br />• ユーザーがHPE iLOを使用して、HPE ProLiant DL365 Gen11サーバーのSSDファームウェアをアップデートできない問題を修正しました。<br />• ストレージサブシステムのヘルス状態を含めて考慮するように、SNMP OID cpqHeMibConditionを修正しました。</p>","Lang":"ja"},{"Enhancements":"<p>&bull; Enabled the replacement of the power-sensor property PowerCapacityWatts with Reading and adding the ReadingUnits property for Rinline server.<br />&bull; Support for certificate management and enhanced measurements for SPDM devices through HPE iLO GUI on HPE ProLiant Gen 11 servers.<br />&bull; Enabled VSP by default.<br />&bull; Support to report system energy consumption counter for ML/DL servers.<br />&bull; Support for Key Management Interoperability Protocol (KMIP) remote key management method for ESKM server.</p>","Fixes":"<p>&bull; Fixed an issue where the Component Integrity Policy menu was not grayed out with an unselected Global Component Integrity option set.<br />&bull; Fixed the empty message arguments that were reported with AggregateHealthStatusChange event while reading HPE iLO events using /redfish/v1/Systems/1/LogServices/Event/Entries.<br />&bull; Fixed an issue where HPE iLO failed to report InPostDiscoveryComplete even after server boot is completed.<br />&bull; Fixed an issue where an HPE iLO 6 user with insufficient privilege was still able to run VSP commands.<br />&bull; Fixed an issue where HPE iLO SNMP became unresponsive when SNMPWALK ran in parallel from multiple consoles.<br />&bull; Fixed an issue with SNMP failed to display a proper output when storage condition is failed.<br />&bull; Fixed an issue where a user was unable to update the SSD firmware for HPE ProLiant DL365 Gen11 server using HPE iLO.<br />&bull; Fixed the SNMP OID cpqHeMibCondition to include and account for the Storage subsystem health condition.</p>","Lang":"cn"}],"Version":"1.73"},{"ReleaseNotes":[{"Enhancements":"<p>&bull; Updated SNMP MIBKIT to add additional storage controller properties and value set.</p><p>&bull; Added new root CA for Micron Drives in iLO for all models from the 7600 series onward.</p><p>&bull; Enabled secure erase of a single NVMe direct attached drive using Redfish API.</p><p>&bull; Enabled RTX600D Pro Accelerator support in iLO6 firmware for HPE ProLiant DL385 Gen11 Platforms.</p><p>&bull; Enabled RTX4500 Accelerator support in iLO6 firmware for HPE ProLiant DL385 Gen11 Platforms.</p><p>&bull; Added support for AMD Instinct MI355X firmware update on HPE ProLiant Compute XD685.</p>","Fixes":"<p>&bull; Fixed the mismatch in Virtual Serial Port (VSP) Enabled state value between Redfish and iLO Command Line Interface (CLI) (/system1/oemHPE_vsp1).</p><p>&bull; Fixed an issue by adding the handling of EAP packet with Identifier Value 0 in iLO.</p><p>&bull; Fixed a file descriptor leak in iLO CLI.</p><p>&bull; Fixed an issue where iLO is taking 20-30 minutes to be accessible after Aux Power Cycle during a firmware flash on HPE ProLiant Compute XD685 with NVIDIA H200 GPU trays.</p><p>&bull; Fixed an issue where NVIDIA HGX PCIe Switch versions are not being displayed on HPE ProLiant Compute XD685 with NVIDIA H200 GPU trays.</p><p>&bull; Fixed issues with auxiliary power reset not working properly on AMD Instinct platforms on HPE ProLiant Compute XD685.</p><p>&bull; Improved firmware update progress percentage when flashing NVIDIA HGX GPU or AMD Instinct GPU firmware packages on HPE ProLiant Compute XD685.</p><p>&bull; Fixed issues with GPU management failing to work after firmware update on HPE ProLiant Compute XD685 with AMD Instinct MI355X GPUs.</p><p>&bull; Fixed issues with AMD Pensando Pollara 400 AI NIC firmware version getting partially truncated on iLO Firmware Inventory page.</p>","Lang":"en"},{"Enhancements":"<p>&bull; Updated SNMP MIBKIT to add additional storage controller properties and value set.</p><p>&bull; Added new root CA for Micron Drives in iLO for all models from the 7600 series onward.</p><p>&bull; Enabled secure erase of a single NVMe direct attached drive using Redfish API.</p><p>&bull; Enabled RTX600D Pro Accelerator support in iLO6 firmware for HPE ProLiant DL385 Gen11 Platforms.</p><p>&bull; Enabled RTX4500 Accelerator support in iLO6 firmware for HPE ProLiant DL385 Gen11 Platforms.</p><p>&bull; Added support for AMD Instinct MI355X firmware update on HPE ProLiant Compute XD685.</p>","Fixes":"<p>&bull; Fixed the mismatch in Virtual Serial Port (VSP) Enabled state value between Redfish and iLO Command Line Interface (CLI) (/system1/oemHPE_vsp1).</p><p>&bull; Fixed an issue by adding the handling of EAP packet with Identifier Value 0 in iLO.</p><p>&bull; Fixed a file descriptor leak in iLO CLI.</p><p>&bull; Fixed an issue where iLO is taking 20-30 minutes to be accessible after Aux Power Cycle during a firmware flash on HPE ProLiant Compute XD685 with NVIDIA H200 GPU trays.</p><p>&bull; Fixed an issue where NVIDIA HGX PCIe Switch versions are not being displayed on HPE ProLiant Compute XD685 with NVIDIA H200 GPU trays.</p><p>&bull; Fixed issues with auxiliary power reset not working properly on AMD Instinct platforms on HPE ProLiant Compute XD685.</p><p>&bull; Improved firmware update progress percentage when flashing NVIDIA HGX GPU or AMD Instinct GPU firmware packages on HPE ProLiant Compute XD685.</p><p>&bull; Fixed issues with GPU management failing to work after firmware update on HPE ProLiant Compute XD685 with AMD Instinct MI355X GPUs.</p><p>&bull; Fixed issues with AMD Pensando Pollara 400 AI NIC firmware version getting partially truncated on iLO Firmware Inventory page.</p>","Lang":"ja"},{"Enhancements":"<p>&bull; Updated SNMP MIBKIT to add additional storage controller properties and value set.</p><p>&bull; Added new root CA for Micron Drives in iLO for all models from the 7600 series onward.</p><p>&bull; Enabled secure erase of a single NVMe direct attached drive using Redfish API.</p><p>&bull; Enabled RTX600D Pro Accelerator support in iLO6 firmware for HPE ProLiant DL385 Gen11 Platforms.</p><p>&bull; Enabled RTX4500 Accelerator support in iLO6 firmware for HPE ProLiant DL385 Gen11 Platforms.</p><p>&bull; Added support for AMD Instinct MI355X firmware update on HPE ProLiant Compute XD685.</p>","Fixes":"<p>&bull; Fixed the mismatch in Virtual Serial Port (VSP) Enabled state value between Redfish and iLO Command Line Interface (CLI) (/system1/oemHPE_vsp1).</p><p>&bull; Fixed an issue by adding the handling of EAP packet with Identifier Value 0 in iLO.</p><p>&bull; Fixed a file descriptor leak in iLO CLI.</p><p>&bull; Fixed an issue where iLO is taking 20-30 minutes to be accessible after Aux Power Cycle during a firmware flash on HPE ProLiant Compute XD685 with NVIDIA H200 GPU trays.</p><p>&bull; Fixed an issue where NVIDIA HGX PCIe Switch versions are not being displayed on HPE ProLiant Compute XD685 with NVIDIA H200 GPU trays.</p><p>&bull; Fixed issues with auxiliary power reset not working properly on AMD Instinct platforms on HPE ProLiant Compute XD685.</p><p>&bull; Improved firmware update progress percentage when flashing NVIDIA HGX GPU or AMD Instinct GPU firmware packages on HPE ProLiant Compute XD685.</p><p>&bull; Fixed issues with GPU management failing to work after firmware update on HPE ProLiant Compute XD685 with AMD Instinct MI355X GPUs.</p><p>&bull; Fixed issues with AMD Pensando Pollara 400 AI NIC firmware version getting partially truncated on iLO Firmware Inventory page.</p>","Lang":"cn"}],"Version":"1.74"}],"SWKeys":[{"Name":"RI12","SWKeyExpectedPath":"firmware:ilo6"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"I45","Model":"HPE Synergy 480 Gen11 Compute Module"},{"Family":"U54","Model":"HPE ProLiant DL380 Gen11 Server"},{"Family":"U54","Model":"HPE ProLiant DL360 Gen11 Server"},{"Family":"U54","Model":"HPE ProLiant ML350 Gen11 Server"},{"Family":"U58","Model":"HPE Alletra Storage Server 4120"},{"Family":"U58","Model":"HPE Alletra 4110 Server"},{"Family":"U63","Model":"HPE ProLiant ML110 Gen11 Server"},{"Family":"U62","Model":"HPE ProLiant DL110 Gen11 Server"},{"Family":"U63","Model":"HPE ProLiant DL320 Gen11 Server"},{"Family":"U57","Model":"HPE Alletra Storage Server 4140"},{"Family":"A55","Model":"HPE ProLiant DL365 Gen11 Server"},{"Family":"A55","Model":"HPE ProLiant DL385 Gen11 Server"},{"Family":"A56","Model":"HPE ProLiant DL345 Gen11 Server"},{"Family":"A56","Model":"HPE ProLiant DL325 Gen11 Server"},{"Family":"U59","Model":"HPE ProLiant DL560 Gen11 Server"},{"Family":"U58","Model":"HPE ProLiant DL380a Gen11"},{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"U65","Model":"HPE ProLiant DL20 Gen11"},{"Family":"U65","Model":"HPE ProLiant ML30 Gen11"},{"Family":"U65","Model":"HPE MicroServer Gen11"},{"Family":"H11","Model":"HPE Compute Edge Server e930t"},{"Family":"U69","Model":"HPE ProLiant Compute DL340 Gen12 SP Server"},{"Family":"A58","Model":"HPE ProLiant DL145 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"},{"Family":"U69","Model":"HPE ProLiant Compute DL320 Gen12 SP Server"},{"Family":"U70","Model":"HPE ProLiant Compute DL380a Gen12 (U70)"},{"Family":"U66","Model":"HPE ProLiant Compute XD230 (U66)"},{"Family":"A59","Model":"HPE ProLiant Compute XD685"},{"Family":"U70","Model":"HPE ProLiant Compute DL380a Gen12"}],"UpgradeRequirements":"Recommended"},"PackageFormat":"FWPKG-v2","Type":"ComboFirmware","UpdatableBy":["Bmc"],"VersionId":"a6410be47a614fd79c5f9e558b05a19c"}]},{"ProductId":"0fd5447fb09a42599ddbf0e58cd0e2e8","Versions":[{"DeviceClass":"e7a8b7dd-a6c0-4056-b14a-97bc423ddc7b","Devices":{"Device":[]},"Package":{"Category":[{"Lang":"en","Value":"Software - System Management"},{"Lang":"ja","Value":"ソフトウェア - システム マネジメント"},{"Lang":"cn","Value":"软件 - 系统管理"}],"Description":[{"Lang":"en","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."},{"Lang":"ja","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."},{"Lang":"cn","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Lights Out"},{"Lang":"ja","Value":"Lights Out"},{"Lang":"cn","Value":"Lights Out"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"9143113","DateModified":"2026-02-24T06:47:00","FileList":["./etc/sysconfig/ahslog","./etc/sysconfig/amsd","./etc/sysconfig/amsd_rev","./etc/sysconfig/cpqFca","./etc/sysconfig/cpqFca_rev","./etc/sysconfig/cpqIde","./etc/sysconfig/cpqIde_rev","./etc/sysconfig/cpqiScsi","./etc/sysconfig/smad","./etc/sysconfig/smad_rev","./opt/amsd","./opt/amsd/amsd.license","./sbin/ahslog","./sbin/amscli","./sbin/cpqiScsi","./usr/lib/.build-id","./usr/lib/.build-id/12","./usr/lib/.build-id/12/ce292aac9739d9baf5589b1482e82bb7490c62","./usr/lib/.build-id/12/ce292aac9739d9baf5589b1482e82bb7490c62.1","./usr/lib/.build-id/56","./usr/lib/.build-id/56/6b72f3ed181c7a50d9c68e1cfd354341a99bfd","./usr/lib/.build-id/56/6b72f3ed181c7a50d9c68e1cfd354341a99bfd.1","./usr/lib/.build-id/7e","./usr/lib/.build-id/7e/0412442fa353b82ff561786734a4968202e844","./usr/lib/.build-id/7e/0412442fa353b82ff561786734a4968202e844.1","./usr/lib/.build-id/8e","./usr/lib/.build-id/8e/11c36ef5352aae2c7444a8210541461702455e","./usr/lib/.build-id/8e/11c36ef5352aae2c7444a8210541461702455e.1","./usr/lib/.build-id/d0","./usr/lib/.build-id/d0/1cdd177ea3ab34fe2ba50f87df425975742a2d","./usr/lib/.build-id/da","./usr/lib/.build-id/da/9afa901b10ccb3418d5524d51885ac9595cc1c","./usr/lib/.build-id/ec","./usr/lib/.build-id/ec/2cb63d98c9dcab3088b990e721fa427064ed3c","./usr/lib/systemd/system/ahslog.service","./usr/lib/systemd/system/amsd.service","./usr/lib/systemd/system/amsd_rev.service","./usr/lib/systemd/system/cpqFca.service","./usr/lib/systemd/system/cpqFca_rev.service","./usr/lib/systemd/system/cpqIde.service","./usr/lib/systemd/system/cpqIde_rev.service","./usr/lib/systemd/system/cpqiScsi.service","./usr/lib/systemd/system/smad.service","./usr/lib/systemd/system/smad_rev.service","./usr/lib/udev/rules.d/81-cpqFca.rules","./usr/lib/udev/rules.d/81-cpqiScsi.rules","./usr/share/man/man8/ahslog.8.gz","./usr/share/man/man8/amsd.8.gz","./usr/share/man/man8/cpqFca.8.gz","./usr/share/man/man8/cpqIde.8.gz","./usr/share/man/man8/cpqiScsi.8.gz","./usr/share/man/man8/smad.8.gz","./usr/share/smartupdate/amsd/component.xml","./sbin/amsd","./sbin/amsd_rev","./sbin/cpqFca","./sbin/cpqFca_rev","./sbin/cpqIde","./sbin/cpqIde_rev","./sbin/smad","./sbin/smad_rev"],"MD5Sum":"4efc6976721cf4c82d082176c98cb09b","Name":"amsd-4.5.0-2120.1.rhel10.aarch64.rpm","Release":"2026-02-24T10:38:04","Revision":"","SHA1Sum":"c7291ffca3dd45015f895084e3f1e67a7451a150","SHA256Sum":"211cae314a8f3dd354716981df32340f3aa87089d8e568b74f9cd4b41b891fe2","Size":"8MB","TargetGUIDs":["20a6e8e4-bf33-4c71-a6bf-d9ecb37bf5ae"],"TypeOfChange":"1","Version":"4.5.0"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{},"PerDeviceInstallTimeSeconds":0,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p>Login as the system administrator (root), download the RPM to a directory on your hard drive and change to that directory.</p><ul><li>To install the package type:<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-&lt;version&gt;.rpm</li></ul></li><li>To check whether the package is loaded properly type:<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>Additional help is available by typing:<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"},{"Lang":"ja","Value":"<p>Login as the system administrator (root), download the RPM to a directory on your hard drive and change to that directory.</p><ul><li>To install the package type:<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-&lt;version&gt;.rpm</li></ul></li><li>To check whether the package is loaded properly type:<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>Additional help is available by typing:<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"},{"Lang":"cn","Value":"<p>Login as the system administrator (root), download the RPM to a directory on your hard drive and change to that directory.</p><ul><li>To install the package type:<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-&lt;version&gt;.rpm</li></ul></li><li>To check whether the package is loaded properly type:<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>Additional help is available by typing:<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Agentless Management Service (iLO 6) for Red Hat Enterprise Linux 10 Server for ARM-based Servers"},{"Lang":"ja","Value":"Agentless Management Service (iLO 6) for Red Hat Enterprise Linux 10 Server for ARM-based Servers"},{"Lang":"cn","Value":"Agentless Management Service (iLO 6) for Red Hat Enterprise Linux 10 Server for ARM-based Servers"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"0"},"SupportedDevices":[{"Id":"2f317b9d-c9e3-4d76-bff6-b9d0d085a952","TargetGUID":"","Type":"other"},{"Id":"2f317b9d-c9e3-4d76-bff6-b9d0d085a952","TargetGUID":"","Type":"other"},{"Dev":"3306","SubDev":"3307","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-330615903307","Type":"pci","Ven":"103c"},{"Dev":"3307","SubDev":"3307","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-330715903307","Type":"pci","Ven":"103c"},{"Dev":"3306","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3306159000e4","Type":"pci","Ven":"103C"},{"Dev":"3307","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3307159000e4","Type":"pci","Ven":"103C"}],"SupportedOperatingSystems":[{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2026-02-25T00:00:00","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"en"},{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"ja"},{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"cn"}],"Version":"4.5.0"}],"SWKeys":[{"Name":"amsd","SWKeyExpectedPath":"software:rpm"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"Software","UpdatableBy":["RuntimeAgent"],"VersionId":"8652ce93105f425ca1a769448143a318"}]},{"ProductId":"d2883a50aa3b46a799d64ea3a77f96a2","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VV003840KXNTH","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM1743HPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3330-3834-304b584e5448","Version":"HPK6"},{"DeviceName":"VV007680KXNTN","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM1743HPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3730-3638-304b584e544e","Version":"HPK6"},{"DeviceName":"VV015360KXNTP","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM1743HPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3531-3336-304b584e5450","Version":"HPK6"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: VV003840KXNTH, VV007680KXNTN and VV015360KXNTP"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive models: VV003840KXNTH, VV007680KXNTN and VV015360KXNTP"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VV003840KXNTH, VV007680KXNTN and VV015360KXNTP Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VV003840KXNTH, VV007680KXNTN and VV015360KXNTP Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"10993408","DateModified":"2025-08-24T09:17:19","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/CP062950.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/GPM1743HPK6.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP062950.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP062950.scexe"],"MD5Sum":"d6bc2d31796fdfa8e85f02e3a5d13355","Name":"firmware-hdd-f20279bc06-0HPK6-1.1_arm64.deb","Release":"2025-08-24T13:14:04","Revision":"","SHA1Sum":"a2f35dc725e21eecca3fc71de98c8d97314602f9","SHA256Sum":"2f328a1604ede8672bdce1927cfa3907a1ebfd302bb4828fe282150e8708abab","Size":"10MB","TargetGUIDs":["562340a5-3056-3330-3834-304b584e5448","562340a5-3056-3730-3638-304b584e544e","562340a5-3056-3531-3336-304b584e5450"],"TypeOfChange":"1","Version":"HPK6"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - VV003840KXNTH, VV007680KXNTN and VV015360KXNTP Drives"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - VV003840KXNTH, VV007680KXNTN and VV015360KXNTP Drives"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VV015360KXNTP","TargetGUID":"562340a5-3056-3531-3336-304b584e5450","Type":"nvme"},{"Id":"VV007680KXNTN","TargetGUID":"562340a5-3056-3730-3638-304b584e544e","Type":"nvme"},{"Id":"VV003840KXNTH","TargetGUID":"562340a5-3056-3330-3834-304b584e5448","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2024-09-29T09:13:27","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Firmware maintenance release.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Firmware maintenance release.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Firmware maintenance release.</li></ul>","Lang":"cn"}],"Version":"HPK6"}],"SWKeys":[{"Name":"VV003840KXNTH","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VV007680KXNTN","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VV015360KXNTP","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"bdc8bac4e2564640bc6466049a16d0bf"}]},{"ProductId":"dfeda317932a458eb967353b53eff149","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VR000480KXNXE","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"M7450ALLHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3438-304b584e5845","Version":"HPK4"},{"DeviceName":"VR000960KXNZU","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"M7450ALLHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3936-304b584e5a55","Version":"HPK4"},{"DeviceName":"VS001920KXNXF","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"M7450ALLHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3053-3130-3932-304b584e5846","Version":"HPK4"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: VR000480KXNXE,VR000960KXNZU and VS001920KXNXF"},{"Lang":"ja","Value":"このarm64 Smartコンポーネントパッケージは、次のドライブモデルのファームウェアを提供します：VR000480KXNXE、VR000960KXNZU、およびVS001920KXNXF"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- VR000480KXNXE,VR000960KXNZU and VS001920KXNXF Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK4</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- VR000480KXNXE,VR000960KXNZU and VS001920KXNXF Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK4</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"4686883","DateModified":"2025-10-13T04:17:44","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/CP068506.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/M7450ALLHPK4.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068506.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068506.scexe"],"MD5Sum":"fe2f4d0fd7a14c220415f121a474b027","Name":"firmware-hdd-2ba844ae8c-HPK4-1.1.aarch64.rpm","Release":"2025-10-13T08:09:28","Revision":"","SHA1Sum":"49a069b91ff55a9a4e4ca0e42edbed2d93893fda","SHA256Sum":"dc0a156a6c561ee42bf2055bdb40cc4db35292f46b9cadc51d10e0f8a89cd20e","Size":"4MB","TargetGUIDs":["562340a5-3052-3030-3438-304b584e5845","562340a5-3052-3030-3936-304b584e5a55","562340a5-3053-3130-3932-304b584e5846"],"TypeOfChange":"1","Version":"HPK4"}],"Installation":{"Command":"CP043255.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032c","SWKey":"032C1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032b","SWKey":"032B1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032a","SWKey":"032A1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900293","SWKey":"02931590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900383","SWKey":"03831590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900382","SWKey":"03821590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0651","SWKey":"0651103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0650","SWKey":"0650103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0652","SWKey":"0652103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0654","SWKey":"0654103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0700","SWKey":"0700103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0600","SWKey":"0600103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0603","SWKey":"0603103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0602","SWKey":"0602103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0601","SWKey":"0601103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1101","SWKey":"1101103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1100","SWKey":"1100103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900329","SWKey":"03291590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e2159003c8","SWKey":"03C81590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900328","SWKey":"03281590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900326","SWKey":"03261590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002db","SWKey":"02DB1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f1590032e","SWKey":"032E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900381","SWKey":"03811590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900294","SWKey":"02941590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002dc","SWKey":"02DC1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900379","SWKey":"03791590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900380","SWKey":"03801590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-2241159002f6","SWKey":"02F61590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030e","SWKey":"030E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030f","SWKey":"030F1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900310","SWKey":"03101590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900325","SWKey":"03251590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online HDD/SSD Flash Component for Linux (arm64) - VR000480KXNXE,VR000960KXNZU and VS001920KXNXF Drives"},{"Lang":"ja","Value":"オンラインHDD/SSDフラッシュコンポーネントfor Linux (arm64) - VR000480KXNXE、VR000960KXNZUおよびVS001920KXNXFドライブ"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VS001920KXNXF","TargetGUID":"562340a5-3053-3130-3932-304b584e5846","Type":"nvme"},{"Id":"VR000480KXNXE","TargetGUID":"562340a5-3052-3030-3438-304b584e5845","Type":"nvme"},{"Id":"VR000960KXNZU","TargetGUID":"562340a5-3052-3030-3936-304b584e5a55","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-24T21:57:06","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Changes and improvements&nbsp;which disable MCTP over PCIe VDM over the previous firmware.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Changes and improvements&nbsp;which disable MCTP over PCIe VDM over the previous firmware.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Changes and improvements&nbsp;which disable MCTP over PCIe VDM over the previous firmware.</li></ul>","Lang":"cn"}],"Version":"HPK4"}],"SWKeys":[{"Name":"VR000480KXNXE","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VR000960KXNZU","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VS001920KXNXF","SWKeyExpectedPath":"firmware:sd:nvme"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"eaa58df9987b48bba0c434cfa873cc03"}]},{"ProductId":"0f71cf6c5c9740e08647e121d410d3e4","Versions":[{"DeviceClass":"e7a8b7dd-a6c0-4056-b14a-97bc423ddc7b","Devices":{"Device":[]},"Package":{"Category":[{"Lang":"en","Value":"Software - Management"},{"Lang":"ja","Value":"ソフトウェア - マネジメント"},{"Lang":"cn","Value":"软件 - 管理"}],"Description":[{"Lang":"en","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."},{"Lang":"ja","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."},{"Lang":"cn","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"5837210","DateModified":"2026-02-24T10:38:55","FileList":["./etc/default/ahslog","./etc/default/amsd","./etc/default/amsd_rev","./etc/default/cpqIde","./etc/default/cpqScsi","./etc/default/cpqiScsi","./etc/default/mr_cpqScsi","./etc/default/smad","./etc/default/smad_rev","./lib/udev/rules.d/81-cpqFca.rules","./lib/udev/rules.d/81-cpqiScsi.rules","./sbin/ahslog","./sbin/amscli","./sbin/amsd","./sbin/amsd_rev","./sbin/cpqFca","./sbin/cpqIde","./sbin/cpqiScsi","./sbin/smad","./sbin/smad_rev","./usr/lib/systemd/system/ahslog.service","./usr/lib/systemd/system/amsd.service","./usr/lib/systemd/system/amsd_rev.service","./usr/lib/systemd/system/cpqFca.service","./usr/lib/systemd/system/cpqIde.service","./usr/lib/systemd/system/cpqScsi.service","./usr/lib/systemd/system/cpqiScsi.service","./usr/lib/systemd/system/mr_cpqScsi.service","./usr/lib/systemd/system/smad.service","./usr/lib/systemd/system/smad_rev.service","./usr/share/amsd/amsd.license","./usr/share/doc/amsd/README.Debian","./usr/share/doc/amsd/changelog.Debian.gz","./usr/share/doc/amsd/copyright","./usr/share/man/man1/ahslog.1m.gz","./usr/share/man/man1/smad.1m.gz","./usr/share/man/man8/amsd.8.gz","./usr/share/man/man8/cpqFca.8.gz","./usr/share/man/man8/cpqiScsi.8.gz","./usr/share/man/man8/mr_cpqScsi.8.gz","./usr/share/smartupdate/amsd/component.xml"],"MD5Sum":"f4a417cce7fd9fa18c97add4311f31a6","Name":"amsd_4.5.0-2120.4-ubuntu24_arm64.deb","Release":"2026-02-24T10:33:05","Revision":"","SHA1Sum":"3bcf3cacef9647ab2f9f2c5cfcfb5466e2b52cea","SHA256Sum":"84587eefb3ce51a18b8d72d02557737b586af7f61af4e054b565c3452545ff9c","Size":"5MB","TargetGUIDs":["20a6e8e4-bf33-4c71-a6bf-d9ecb37bf5ae"],"TypeOfChange":"1","Version":"4.5.0"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{},"PerDeviceInstallTimeSeconds":0,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p>Download the component and run the command &quot;dpkg -i&nbsp;amsd_3.1.0-1748-jammy_arm64.deb&quot;</p>"},{"Lang":"ja","Value":"<p>Download the component and run the command &quot;dpkg -i&nbsp;amsd_3.1.0-1748-jammy_arm64.deb&quot;</p>"},{"Lang":"cn","Value":"<p>Download the component and run the command &quot;dpkg -i&nbsp;amsd_3.1.0-1748-jammy_arm64.deb&quot;</p>"}],"ManufacturerName":[],"Name":[{"Lang":"en","Value":"Agentless Management Service (iLO 6) for Ubuntu 24.04 LTS aarch64"},{"Lang":"ja","Value":"Agentless Management Service (iLO 6) for Ubuntu 24.04 LTS aarch64"},{"Lang":"cn","Value":"Agentless Management Service (iLO 6) for Ubuntu 24.04 LTS aarch64"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"0"},"SupportedOperatingSystems":[{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS ARM","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2026-02-25T00:00:00","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"en"},{"Enhancements":"<p>HPE ProLiant Compute DL384 Gen12サーバーのAMS認定</p>","Fixes":"<p>非NVMeローカルドライブのホットアド/リムーブ時にamsdがクラッシュする問題を修正。</p>","Lang":"ja"},{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"cn"}],"Version":"4.5.0"}],"SWKeys":[{"Name":"amsd","SWKeyExpectedPath":"software:deb"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"Software","UpdatableBy":["RuntimeAgent"],"VersionId":"9b66524c2381493c9e596b0b3e4da4e7"}]},{"ProductId":"744889f2dcd049f28bb74e4262d11276","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"MV003200LYJKH","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7AEFHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3330-3230-304c594a4b48","Version":"HPK4"},{"DeviceName":"MV006400LYJKK","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7AEFHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3630-3430-304c594a4b4b","Version":"HPK4"},{"DeviceName":"VV007680LYJKF","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7AEFHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3730-3638-304c594a4b46","Version":"HPK4"},{"DeviceName":"VV015360LYXMT","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7AEFHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3531-3336-304c59584d54","Version":"HPK4"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive model: MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive model: MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux deb (arm64) - MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK4</p><p><br />&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux deb (arm64) - MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK4</p><p><br />&nbsp;</p>"}],"Files":[{"Bytes":"10108532","DateModified":"2025-08-25T11:31:08","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/CP068513.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/KACM7AEFHPK4.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-03eeb5f134-HPK4-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068513.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068513.scexe"],"MD5Sum":"8f9dc6752c254c31caae8e4338691a35","Name":"firmware-hdd-03eeb5f134-0HPK4-1.1_arm64.deb","Release":"2025-08-25T15:27:52","Revision":"","SHA1Sum":"0ecfadb62028f43099d1dcee2726b516895fa9b2","SHA256Sum":"a71674bf4f443e61c5d5c2d24941fc2e8a95bea5f7a739b27d9be3e37657faa2","Size":"9MB","TargetGUIDs":["4d2340a5-3056-3330-3230-304c594a4b48","4d2340a5-3056-3630-3430-304c594a4b4b","562340a5-3056-3730-3638-304c594a4b46","562340a5-3056-3531-3336-304c59584d54"],"TypeOfChange":"1","Version":"HPK4"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - MV003200LYJKH, MV006400LYJKK, VV007680LYJKF and VV015360LYXMT Drives"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"MV006400LYJKK","TargetGUID":"4d2340a5-3056-3630-3430-304c594a4b4b","Type":"nvme"},{"Id":"VV007680LYJKF","TargetGUID":"562340a5-3056-3730-3638-304c594a4b46","Type":"nvme"},{"Id":"VV015360LYXMT","TargetGUID":"562340a5-3056-3531-3336-304c59584d54","Type":"nvme"},{"Id":"MV003200LYJKH","TargetGUID":"4d2340a5-3056-3330-3230-304c594a4b48","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-24T22:15:59","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance release for sanitize, DRAM,DMA transfer and log page fix.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance release for sanitize, DRAM,DMA transfer and log page fix.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance release for sanitize, DRAM,DMA transfer and log page fix.</li></ul>","Lang":"cn"}],"Version":"HPK4"}],"SWKeys":[{"Name":"MV003200LYJKH","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MV006400LYJKK","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VV007680LYJKF","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VV015360LYXMT","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"0cf2787df17b434383533b4572065074"}]},{"ProductId":"e8927123b15f4b749e7264389a03efcf","Versions":[{"DeviceClass":"e7a8b7dd-a6c0-4056-b14a-97bc423ddc7b","Devices":{"Device":[]},"Package":{"Category":[{"Lang":"en","Value":"Software - Management"},{"Lang":"ja","Value":"ソフトウェア - マネジメント"},{"Lang":"cn","Value":"软件 - 管理"}],"Description":[{"Lang":"en","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."},{"Lang":"ja","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."},{"Lang":"cn","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"5856208","DateModified":"2026-02-24T10:30:14","FileList":["./etc/default/ahslog","./etc/default/amsd","./etc/default/amsd_rev","./etc/default/cpqIde","./etc/default/cpqScsi","./etc/default/cpqiScsi","./etc/default/mr_cpqScsi","./etc/default/smad","./etc/default/smad_rev","./lib/systemd/system/ahslog.service","./lib/systemd/system/amsd.service","./lib/systemd/system/amsd_rev.service","./lib/systemd/system/cpqFca.service","./lib/systemd/system/cpqFca_rev.service","./lib/systemd/system/cpqIde.service","./lib/systemd/system/cpqIde_rev.service","./lib/systemd/system/cpqScsi.service","./lib/systemd/system/cpqiScsi.service","./lib/systemd/system/mr_cpqScsi.service","./lib/systemd/system/smad.service","./lib/systemd/system/smad_rev.service","./lib/udev/rules.d/81-cpqFca.rules","./lib/udev/rules.d/81-cpqiScsi.rules","./sbin/ahslog","./sbin/amscli","./sbin/amsd","./sbin/amsd_rev","./sbin/cpqFca","./sbin/cpqIde","./sbin/cpqiScsi","./sbin/smad","./sbin/smad_rev","./usr/share/amsd/amsd.license","./usr/share/doc/amsd/README.Debian","./usr/share/doc/amsd/changelog.Debian.gz","./usr/share/doc/amsd/copyright","./usr/share/man/man1/ahslog.1m.gz","./usr/share/man/man1/smad.1m.gz","./usr/share/man/man8/amsd.8.gz","./usr/share/man/man8/cpqFca.8.gz","./usr/share/man/man8/cpqiScsi.8.gz","./usr/share/man/man8/mr_cpqScsi.8.gz","./usr/share/smartupdate/amsd/component.xml"],"MD5Sum":"f6e92e40b8645c143b3b1caf3aaa0d73","Name":"amsd_4.5.0-2120.2-ubuntu22_arm64.deb","Release":"2026-02-24T10:23:57","Revision":"","SHA1Sum":"c524eb1eb27b3aad9ee30d7182e95bafab6351e7","SHA256Sum":"aed9a1046060d24d8e69adc119b55bebdbabf141b5d8da32dabcc58f1992d6f4","Size":"5MB","TargetGUIDs":["20a6e8e4-bf33-4c71-a6bf-d9ecb37bf5ae"],"TypeOfChange":"1","Version":"4.5.0"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{},"PerDeviceInstallTimeSeconds":0,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p>Download the component and run the command &quot;dpkg -i&nbsp;amsd_3.1.0-1748-jammy_arm64.deb&quot;</p>"},{"Lang":"ja","Value":"<p>Download the component and run the command &quot;dpkg -i&nbsp;amsd_3.1.0-1748-jammy_arm64.deb&quot;</p>"},{"Lang":"cn","Value":"<p>Download the component and run the command &quot;dpkg -i&nbsp;amsd_3.1.0-1748-jammy_arm64.deb&quot;</p>"}],"ManufacturerName":[],"Name":[{"Lang":"en","Value":"Agentless Management Service (iLO 6) for Ubuntu 22.04 LTS aarch64"},{"Lang":"ja","Value":"Agentless Management Service (iLO 6) for Ubuntu 22.04 LTS aarch64"},{"Lang":"cn","Value":"Agentless Management Service (iLO 6) for Ubuntu 22.04 LTS aarch64"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"0"},"SupportedOperatingSystems":[{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS ARM","Platform":"ubuntu2204","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2026-02-25T00:00:00","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"en"},{"Enhancements":"","Fixes":"<p>非NVMeローカルドライブのホットアド/リムーブ時にamsdがクラッシュする問題を修正。</p>","Lang":"ja"},{"Enhancements":"","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"cn"}],"Version":"4.5.0"}],"SWKeys":[{"Name":"amsd","SWKeyExpectedPath":"software:deb"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"Software","UpdatableBy":["RuntimeAgent"],"VersionId":"8c8c1a5f0f0d423490af485ec19b502e"}]},{"ProductId":"e316b66b271b47fc80ca7f43b1a1a853","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VO001920KYDMT","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-304f-3130-3932-304b59444d54","Version":"HPK6"},{"DeviceName":"VO003840KYDMV","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-304f-3330-3834-304b59444d56","Version":"HPK6"},{"DeviceName":"MO001600KYDMU","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-304f-3130-3630-304b59444d55","Version":"HPK6"},{"DeviceName":"MO003200KYDNC","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-304f-3330-3230-304b59444e43","Version":"HPK6"},{"DeviceName":"MO006400KYDND","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-304f-3630-3430-304b59444e44","Version":"HPK6"},{"DeviceName":"VO007680KYDNA","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-304f-3730-3638-304b59444e41","Version":"HPK6"},{"DeviceName":"VO015360KYDNB","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-304f-3531-3336-304b59444e42","Version":"HPK6"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: VO001920KYDMT, VO003840KYDMV, MO001600KYDMU, MO003200KYDNC, MO006400KYDND, VO007680KYDNA and VO015360KYDNB"},{"Lang":"ja","Value":"このarm64 Smartコンポーネントは、次のドライブモデルのファームウェアを提供します。VO001920KYDMT、VO003840KYDMV、MO001600KYDMU、MO003200KYDNC、MO006400KYDND、VO007680KYDNA、およびVO015360KYDNB"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VO001920KYDMT, VO003840KYDMV, MO001600KYDMU, MO003200KYDNC, MO006400KYDND, VO007680KYDNA and VO015360KYDNB Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VO001920KYDMT, VO003840KYDMV, MO001600KYDMU, MO003200KYDNC, MO006400KYDND, VO007680KYDNA and VO015360KYDNB Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"10680224","DateModified":"2025-08-24T08:59:22","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/CP068495.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/GPM173XAHPK6.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068495.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068495.scexe"],"MD5Sum":"2582b44f69719016a611e51faa1327fa","Name":"firmware-hdd-a27c95663d-0HPK6-1.1_arm64.deb","Release":"2025-08-24T12:56:04","Revision":"","SHA1Sum":"74caedc263967ba1298bf12debcb4c0619c67506","SHA256Sum":"0b27778bd0c14a79191b0e49b1822a429bdf33dc0b97484d2390ec9540142413","Size":"10MB","TargetGUIDs":["562340a5-304f-3130-3932-304b59444d54","562340a5-304f-3330-3834-304b59444d56","4d2340a5-304f-3130-3630-304b59444d55","4d2340a5-304f-3330-3230-304b59444e43","4d2340a5-304f-3630-3430-304b59444e44","562340a5-304f-3730-3638-304b59444e41","562340a5-304f-3531-3336-304b59444e42"],"TypeOfChange":"1","Version":"HPK6"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - VO001920KYDMT, VO003840KYDMV, MO001600KYDMU, MO003200KYDNC, MO006400KYDND, VO007680KYDNA and VO015360KYDNB Drives"},{"Lang":"ja","Value":"オンラインNVMe SSDフラッシュコンポーネントfor Linux deb (arm64) - VO001920KYDMT、VO003840KYDMV、MO001600KYDMU、MO003200KYDNC、MO006400KYDND、VO007680KYDNA、およびVO015360KYDNBドライブ"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"MO001600KYDMU","TargetGUID":"4d2340a5-304f-3130-3630-304b59444d55","Type":"nvme"},{"Id":"MO006400KYDND","TargetGUID":"4d2340a5-304f-3630-3430-304b59444e44","Type":"nvme"},{"Id":"VO015360KYDNB","TargetGUID":"562340a5-304f-3531-3336-304b59444e42","Type":"nvme"},{"Id":"VO007680KYDNA","TargetGUID":"562340a5-304f-3730-3638-304b59444e41","Type":"nvme"},{"Id":"MO003200KYDNC","TargetGUID":"4d2340a5-304f-3330-3230-304b59444e43","Type":"nvme"},{"Id":"VO001920KYDMT","TargetGUID":"562340a5-304f-3130-3932-304b59444d54","Type":"nvme"},{"Id":"VO003840KYDMV","TargetGUID":"562340a5-304f-3330-3834-304b59444d56","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-22T09:15:43","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Previous firmware version HPK5 may cause Uncorrectable Machine Check Exception (UMCE) to occur. It is recommended to update firmware version to HPK6.</li><li>For more information, CA is published&nbsp;at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us\" id=\"menur8o\" rel=\"noreferrer noopener\" target=\"_blank\" title=\"https://support.hpe.com/hpesc/public/docdisplay?docid=a00142315en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us</a></li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Previous firmware version HPK5 may cause Uncorrectable Machine Check Exception (UMCE) to occur. It is recommended to update firmware version to HPK6.</li><li>For more information, CA is published&nbsp;at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us\" id=\"menur8o\" rel=\"noreferrer noopener\" target=\"_blank\" title=\"https://support.hpe.com/hpesc/public/docdisplay?docid=a00142315en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us</a></li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Previous firmware version HPK5 may cause Uncorrectable Machine Check Exception (UMCE) to occur. It is recommended to update firmware version to HPK6.</li><li>For more information, CA is published&nbsp;at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us\" id=\"menur8o\" rel=\"noreferrer noopener\" target=\"_blank\" title=\"https://support.hpe.com/hpesc/public/docdisplay?docid=a00142315en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us</a></li></ul>","Lang":"cn"}],"Version":"HPK6"}],"SWKeys":[{"Name":"VO001920KYDMT","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VO003840KYDMV","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MO001600KYDMU","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MO003200KYDNC","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MO006400KYDND","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VO007680KYDNA","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VO015360KYDNB","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"303c8108748f40878f16217b3baa891a"}]},{"ProductId":"2cea1aa2095a4bf8996d2ce3b06a524f","Versions":[{"DeviceClass":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Devices":{"Device":[{"DeviceName":"MT_0000000551","FirmwareImages":[{"DelayAfterInstallSec":10,"FileName":".//fw-ConnectX6Lx-rel-26_46_3048-MCX631432AS-ADA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","InstallDurationSec":3600,"Order":1,"ResetRequired":true,"Type":"Firmware","UEFIFlashable":false}],"Target":"a6b1a447-382a-5a4f-15b3-101f15b30012","Version":"26.46.3048"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - Network"},{"Lang":"ja","Value":"ファームウェア - ネットワーク"},{"Lang":"cn","Value":"固件 - 网络"}],"Description":[{"Lang":"en","Value":"This package contains the utilities and binary for upgrading Mellanox MCX631432AS-ADAI Ethernet 10/25Gb 2-port SFP28 OCP3 Adapter for HPE firmware on ARM Linux Operating Systems."},{"Lang":"ja","Value":"このパッケージには、ARM Linuxオペレーティングシステム上でMellanox MCX631432AS-ADAI Ethernet 10/25Gb 2ポートSFP28 OCP3アダプターのHPEファームウェアをアップグレードするためのユーティリティとバイナリが含まれています。"},{"Lang":"cn","Value":"This package contains the utilities and binary for upgrading Mellanox MCX631432AS-ADAI Ethernet 10/25Gb 2-port SFP28 OCP3 Adapter for HPE firmware on ARM Linux Operating Systems."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Networking"},{"Lang":"ja","Value":"ネットワーク"},{"Lang":"cn","Value":"网络"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[{"Lang":"en","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631432AS-ADAI Ethernet 10/25Gb 2-port SFP28 OCP3 Adapter for HPE&nbsp; (P42041-B21)</td><td>26.46.3048</td><td>MT_0000000551</td></tr></tbody></table><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631432AS-ADAI Ethernet 10/25Gb 2-port SFP28 OCP3 Adapter for HPE&nbsp; (P42041-B21)</td><td>26.46.3048</td><td>MT_0000000551</td></tr></tbody></table><p>&nbsp;</p>"},{"Lang":"cn","Value":"<p>This software package contains the following firmware versions:</p><table border=\"1\" cellpadding=\"1\" cellspacing=\"1\"><tbody><tr><td><strong>Mellanox Ethernet Only Adapters</strong></td><td><strong>Firmware Version</strong></td><td><strong>PSID</strong></td></tr><tr><td>Mellanox MCX631432AS-ADAI Ethernet 10/25Gb 2-port SFP28 OCP3 Adapter for HPE&nbsp; (P42041-B21)</td><td>26.46.3048</td><td>MT_0000000551</td></tr></tbody></table><p>&nbsp;</p>"}],"Files":[{"Bytes":"11774428","DateModified":"2026-03-02T02:23:27","FileList":["./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1/CP068334.xml","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1/acpqsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1/cpqsetup","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1/fw-ConnectX6Lx-rel-26_46_3048-MCX631432AS-ADA_Ax-UEFI-14.39.14-FlexBoot-3.8.100.signed.bin","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1/ilorest_chif.so","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1/mft-4.32.0-120.tgz","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1/mlxfwmanager","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068334.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068334.scexe","./usr/lib/aarch64-linux-gnu/firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1/hpsetup"],"MD5Sum":"0a50e3bd527a8415b62d7a73deba7fc4","Name":"firmware-nic-mlnx-mcx631432as-adai-26.46.3048-1.1_arm64.deb","Release":"2026-03-02T06:22:05","Revision":"","SHA1Sum":"84169d7ad2c54067d78d73db6ab1dc2bc9f8a8b0","SHA256Sum":"4c575de47061499a4748dbb111e9a075253fe2beb374b38c70a0ae457a9f2713","Size":"11MB","TargetGUIDs":["a6b1a447-382a-5a4f-15b3-101f15b30012"],"TypeOfChange":"1","Version":"26.46.3048"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"no"},"PerDeviceInstallTimeSeconds":3600,"RebootDetails":[{"Lang":"en","Value":"Reboot is required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要です。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"yes","RebootRequirement":"Required"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the DEB as: dpkg -i &lt;deb_filename&gt;.deb. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the deb installed).</li><li>To uninstall, run: dpkg --remove &lt;deb_package_name&gt;</li></ul><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"},{"Lang":"ja","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the DEB as: dpkg -i &lt;deb_filename&gt;.deb. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the deb installed).</li><li>To uninstall, run: dpkg --remove &lt;deb_package_name&gt;</li></ul><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"},{"Lang":"cn","Value":"<p><strong>Updating firmware with rpm installed:</strong></p><ul><li>Install the DEB as: dpkg -i &lt;deb_filename&gt;.deb. This will extract the contents to the &#39;/usr/lib/aarch64-linux-gun&#39; location.</li><li>The CPxxxxxx.scexe script will be located in the &#39;scexe-compat&#39; folder.&nbsp;</li><li>From the terminal, you can call the &quot;./CPxxxxxx.scexe&quot; under &#39;/usr/lib/aarch64-linux-gun/scexe-compat&#39; location , to update the firmware (The actual name of the &#39;firmware-nic-*&#39; folder is determined based on the deb installed).</li><li>To uninstall, run: dpkg --remove &lt;deb_package_name&gt;</li></ul><p><strong>On Secure Boot Enable mode:</strong></p><p>This product requires the Nvidia MFT Tools for your device and operating system to be installed before the firmware is updated on Secure Boot enable mode.<br />Also, install the Nvidia (Mellanox) MFT tools and ensure the MST PCI module and MST PCI configuration module is loaded and running before attempting the firmware update on Secure Boot enable mode.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Mellanox MCX631432AS-ADAI Online Firmware Upgrade Utility for Linux DEB aarch64"},{"Lang":"ja","Value":"Mellanox MCX631432AS-ADAIオンラインファームウェアアップグレードユーティリティfor Linux DEB aarch64"},{"Lang":"cn","Value":"Mellanox MCX631432AS-ADAI Online Firmware Upgrade Utility for Linux DEB aarch64"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"1024"},"SupportedDevices":[{"Dev":"101f","SubDev":"0007","SubVen":"15b3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101f15b30007","Type":"pci","Ven":"15b3"},{"Dev":"101E","SubDev":"0007","SubVen":"15B3","TargetGUID":"a6b1a447-382a-5a4f-15b3-101e15b30007","Type":"pci","Ven":"15B3"}],"SupportedOperatingSystems":[{"Major":"20","Minor":"4","Name":"Ubuntu 20.04 LTS","Platform":"ubuntu","Sr":"OEM"},{"Major":"18","Minor":"4","Name":"Ubuntu 18.04","Platform":"Ubuntu","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"},{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-12T08:03:50","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"en"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"ja"},{"Enhancements":"<p><strong>New features and changes included in version&nbsp;26.46.3048:</strong></p><ul><li>Added support for RSS with crypto offload enabling the NIC to parallelize packet processing across CPU cores while performing encryption/decryption in hardware. Additionally, introduced a new l4_type_ext parameter with values: 0 (None), 1 (TCP), 2 (UDP), 3 (ICMP).</li><li>Added an extra validation for the payload_len field in incoming NC-SI messages. Previously, invalid packets might have been accepted; now, such packets are silently dropped.</li><li>This release contains important reliability improvements and security hardening enhancements. HPE recommends upgrading your devices firmware to this release to improve the devices&rsquo; firmware security and reliability.</li></ul>","Fixes":"<p><strong>The following issues have been fixed in version 26.46.3048:</strong></p><ul><li>Configuring a small MTU led to fragmentation of packets critical for the PXE boot process. As a result, the PXE boot filters mistakenly discarded these packets, causing the PXE boot to fail.</li></ul><p>&nbsp;</p>","Lang":"cn"}],"Version":"26.46.3048"}],"SWKeys":[{"Name":"MT_0000000551","SWKeyExpectedPath":"firmware:nic_mlnx_mcx631432as_adai"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R12","Model":"HPE ProLiant RL340 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"ComboFirmware","UpdatableBy":["RuntimeAgent"],"VersionId":"8908febd139045bebd5ad71fdd9dc647"}]},{"ProductId":"1d4ec3582de648c5a0415a5960a70552","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"MV003200LXUJK","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7ALEHPK7.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3330-3230-304c58554a4b","Version":"HPK7"},{"DeviceName":"MV006400LXUJL","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7ALEHPK7.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3630-3430-304c58554a4c","Version":"HPK7"},{"DeviceName":"VV003840LXUJE","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7ALEHPK7.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3330-3834-304c58554a45","Version":"HPK7"},{"DeviceName":"VV007680LXUJF","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7ALEHPK7.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3730-3638-304c58554a46","Version":"HPK7"},{"DeviceName":"VV015360LXUJH","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7ALEHPK7.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3531-3336-304c58554a48","Version":"HPK7"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: MV003200LXUJK, MV006400LXUJL, VV003840LXUJE, VV007680LXUJF and VV015360LXUJH"},{"Lang":"ja","Value":"このarm64 Smartコンポーネントは、次のドライブモデルのファームウェアを提供します。MV003200LXUJK、MV006400LXUJL、VV003840LXUJE、VV007680LXUJF、およびVV015360LXUJH"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- MV003200LXUJK, MV006400LXUJL, VV003840LXUJE, VV007680LXUJF and VV015360LXUJH Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK7</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- MV003200LXUJK, MV006400LXUJL, VV003840LXUJE, VV007680LXUJF and VV015360LXUJH Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK7</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"5528397","DateModified":"2025-10-13T02:53:43","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/CP068496.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/KACM7ALEHPK7.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068496.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068496.scexe"],"MD5Sum":"6f536ba19b13c10da62641e4a70b5e18","Name":"firmware-hdd-44d456ce65-HPK7-1.1.aarch64.rpm","Release":"2025-10-13T06:45:31","Revision":"","SHA1Sum":"dd547a644f7077f08a06058f49036d87a41fa876","SHA256Sum":"3626c17b2436ee9247b18aab38feecfe1161db82cdbeecae3a2f1a2321639c0c","Size":"5MB","TargetGUIDs":["4d2340a5-3056-3330-3230-304c58554a4b","4d2340a5-3056-3630-3430-304c58554a4c","562340a5-3056-3330-3834-304c58554a45","562340a5-3056-3730-3638-304c58554a46","562340a5-3056-3531-3336-304c58554a48"],"TypeOfChange":"1","Version":"HPK7"}],"Installation":{"Command":"CP043255.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032c","SWKey":"032C1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032b","SWKey":"032B1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032a","SWKey":"032A1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900293","SWKey":"02931590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900383","SWKey":"03831590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900382","SWKey":"03821590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0651","SWKey":"0651103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0650","SWKey":"0650103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0652","SWKey":"0652103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0654","SWKey":"0654103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0700","SWKey":"0700103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0600","SWKey":"0600103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0603","SWKey":"0603103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0602","SWKey":"0602103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0601","SWKey":"0601103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1101","SWKey":"1101103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1100","SWKey":"1100103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900329","SWKey":"03291590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e2159003c8","SWKey":"03C81590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900328","SWKey":"03281590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900326","SWKey":"03261590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002db","SWKey":"02DB1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f1590032e","SWKey":"032E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900381","SWKey":"03811590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900294","SWKey":"02941590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002dc","SWKey":"02DC1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900379","SWKey":"03791590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900380","SWKey":"03801590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-2241159002f6","SWKey":"02F61590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030e","SWKey":"030E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030f","SWKey":"030F1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900310","SWKey":"03101590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900325","SWKey":"03251590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run&nbsp;./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run&nbsp;./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online HDD/SSD Flash Component for Linux (arm64) - MV003200LXUJK, MV006400LXUJL, VV003840LXUJE, VV007680LXUJF and VV015360LXUJH Drives"},{"Lang":"ja","Value":"オンラインHDD/SSDフラッシュコンポーネントfor Linux (arm64) - MV003200LXUJK、MV006400LXUJL、VV003840LXUJE、VV007680LXUJF、およびVV015360LXUJHドライブ"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VV007680LXUJF","TargetGUID":"562340a5-3056-3730-3638-304c58554a46","Type":"nvme"},{"Id":"VV015360LXUJH","TargetGUID":"562340a5-3056-3531-3336-304c58554a48","Type":"nvme"},{"Id":"MV006400LXUJL","TargetGUID":"4d2340a5-3056-3630-3430-304c58554a4c","Type":"nvme"},{"Id":"VV003840LXUJE","TargetGUID":"562340a5-3056-3330-3834-304c58554a45","Type":"nvme"},{"Id":"MV003200LXUJK","TargetGUID":"4d2340a5-3056-3330-3230-304c58554a4b","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-22T10:57:16","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance for fixing MCU,sanitize, DRAM and log page..etc.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance for fixing MCU,sanitize, DRAM and log page..etc.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance for fixing MCU,sanitize, DRAM and log page..etc.</li></ul>","Lang":"cn"}],"Version":"HPK7"}],"SWKeys":[{"Name":"MV003200LXUJK","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"MV006400LXUJL","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV003840LXUJE","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV007680LXUJF","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV015360LXUJH","SWKeyExpectedPath":"firmware:sd:nvme"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"ab2025105b4b4e5ca86e1dd4b14a253c"}]},{"ProductId":"923bb6bba3254a6d80257c1bf056f39d","Versions":[{"DeviceClass":"4149ebb7-d64b-4654-b679-4280f349ea50","Devices":{"Device":[{"DeviceName":"UBM6 Backplane PIC","FirmwareImages":[{"DelayAfterInstallSec":0,"DirectFlashOK":true,"FileName":"HPE_UBM6_1.06_A.HPb","InstallDurationSec":600,"Order":1,"PLDMImage":true,"ResetRequired":false,"ServerPowerOff":false,"SysPowerOn":true,"Type":"Firmware","UEFIFlashable":false}],"Target":"9675b54e-1c96-44c3-a7a1-901506000000","Version":"1.06"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - System"},{"Lang":"ja","Value":"ファームウェア - システム"},{"Lang":"cn","Value":"固件 - 系统 ROM"}],"Description":[{"Lang":"en","Value":"This firmware package contains PLDM firmware for UBM6 storage backplanes."},{"Lang":"ja","Value":"このファームウェアパッケージには、UBM6ストレージバックプレーンのPLDMファームウェアが含まれています。"},{"Lang":"cn","Value":"This firmware package contains PLDM firmware for UBM6 storage backplanes."}],"Divisions":[{"Division":[{"Lang":"en","Value":"ServerOptions"},{"Lang":"ja","Value":"サーバ オプション"},{"Lang":"cn","Value":"服务器选项"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"131393","DateModified":"2025-11-06T01:02:20","FileList":["HPE_UBM6_1.06_A.HPb","HPE_UBM6_1.06_A.xml","payload.json"],"MD5Sum":"bb281ebaeed195a1fe0759a768371a32","Name":"HPE_UBM6_1.06_A.fwpkg","Release":"2025-11-06T01:00:03","Revision":"C","SHA1Sum":"56cbc2c8a4f62fb636f057be45f406683a7ae465","SHA256Sum":"df08ac1cfa765c1ab04a7f11a308787701a19f713942cdc4c918ec7a49ee6734","Size":"128KB","TargetGUIDs":["9675b54e-1c96-44c3-a7a1-901506000000"],"TypeOfChange":"1","Version":"1.06"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":600,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.22.3-4597 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.22.3-4597 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900325","SWKey":"03251590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900382","SWKey":"03821590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.32"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900383","SWKey":"03831590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.32"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002db","SWKey":"02DB1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900381","SWKey":"03811590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f1590032e","SWKey":"032E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900329","SWKey":"03291590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900326","SWKey":"03261590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen10 Plus/Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen10 Plus/Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032b","SWKey":"032B1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR408i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR408i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e2159003c8","SWKey":"03C81590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen10 Plus/Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen10 Plus/Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900293","SWKey":"02931590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-o Gen11 Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900328","SWKey":"03281590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4597"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-a Gen10 Plus Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-a Gen10 Plus Tri Mode controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032a","SWKey":"032A1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4650"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.22.3 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032c","SWKey":"032C1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.22.3-4650"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR308i-o/SR308i-p controller firmware version 5.32 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0651","SWKey":"0651103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.32"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus Controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus Controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002dc","SWKey":"02DC1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus Controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus Controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900294","SWKey":"02941590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p>Flash the PLDM firmware using any below methods</p><ol><li>Flash using iLOrest tool&nbsp;</li><li>Flash using&nbsp;Smart Update Manager (SUM).</li><li>Flash from iLO GUI</li></ol><p>1. To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>&nbsp; &nbsp; localhost OS example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p><p>&nbsp; &nbsp; remote example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO_IP_Address&gt; -u &lt;iLO_username&gt; -p &lt;iLO_password&gt;</em></strong></p><p>2. This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p><p><strong>&nbsp; &nbsp; Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p><ul><li><p>Place the Service Pack for ProLiant on a USB key using the&nbsp;USB Key Creator Utility.</p></li><li><p>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\\packages&quot; on the USB key.</p></li></ul><p>&nbsp; &nbsp; &nbsp;Update the firmware and software&nbsp;in the usual manner.</p><p>3.&nbsp;Flash from iLO GUI</p><ul><li>Browse iLO IP using any browser and login using the credential&nbsp;</li><li>Make sure the PLDM supported adapter is present in the server</li><li>Go to iLO GUI -&gt; Click on &quot;Firmware and OS software&quot; from left side&nbsp;&nbsp;-&gt; Click on &quot;Update Firmware&quot; -&gt; Click on &quot;Choose File&quot; and browse to the supported PLDM file -&gt; Then click on &quot;Flash&quot; button.&nbsp;</li><li>Update status will be show in the Top and a log entry can be seen in Integrated Managenment Log (IML)&nbsp;</li></ul>"},{"Lang":"ja","Value":"<p>以下のいずれかの方法を使用してPLDMファームウェアをフラッシュします</p><ol><li>iLOrestツールを使用したフラッシュ </li><li>Smart Update Manager（SUM）を使用したフラッシュ</li><li>iLO GUIからのフラッシュ</li></ol><p>1. このファームウェアパッケージをフラッシュするには、次のiLOrestコマンドを使用します。 iLOrestツールの最新バージョンをダウンロードするには、<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>を参照してください。</p><p>    ローカルホストOSの例：<br /><strong><em>    ilorest flashfwpkg <file_name.fwpkg> </em></strong></p><p>    リモートの例：<br /><strong><em>ilorest flashfwpkg <file_name.fwpkg> --url <iLO_IP_Address> -u <iLO_username> -p <iLO_password></em></strong></p><p>2. このファームウェアパッケージは、Smart Update Manager（SUM）の最新バージョンでもインストールできます。</p><p>サポートされるProLiantサーバーおよびオプションのための<strong>サプリメンタルアップデート</strong>は、<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong> (SPP) ISO上にあるSUMを使用して実行できます。</p><ul><li><p>USB Key Creator Utilityを使用して、Service Pack for ProLiantをUSBキーにコピーします。</p></li><li><p>アップデートに必要なファームウェアパッケージおよびコンポーネントをUSBキーの\"\\packages\"ディレクトリにコピーします。</p></li></ul><p>     通常の手順でファームウェアおよびソフトウェアをアップデートします。</p><p>3. iLO GUIからのフラッシュ</p><ul><li>任意のブラウザーを使用してiLO IPを参照し、資格情報を使用してログインします </li><li>PLDMでサポートされているアダプターがサーバーに存在していることを確認します</li><li>iLO GUIに移動します -> 左側から[ファームウェア & OSソフトウェア]をクリックします -> [ファームウェアのアップデート]をクリックします -> [ファイルを選択]をクリックして、サポートされているPLDMファイルを参照します -> [フラッシュ]ボタンをクリックします。 </li><li>アップデートステータスが上部に表示され、インテグレーテッドマネジメントログ（IML）にログエントリーが記録されます。 </li></ul>"},{"Lang":"cn","Value":"<p>Flash the PLDM firmware using any below methods</p><ol><li>Flash using iLOrest tool&nbsp;</li><li>Flash using&nbsp;Smart Update Manager (SUM).</li><li>Flash from iLO GUI</li></ol><p>1. To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>&nbsp; &nbsp; localhost OS example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p><p>&nbsp; &nbsp; remote example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO_IP_Address&gt; -u &lt;iLO_username&gt; -p &lt;iLO_password&gt;</em></strong></p><p>2. This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p><p><strong>&nbsp; &nbsp; Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p><ul><li><p>Place the Service Pack for ProLiant on a USB key using the&nbsp;USB Key Creator Utility.</p></li><li><p>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\\packages&quot; on the USB key.</p></li></ul><p>&nbsp; &nbsp; &nbsp;Update the firmware and software&nbsp;in the usual manner.</p><p>3.&nbsp;Flash from iLO GUI</p><ul><li>Browse iLO IP using any browser and login using the credential&nbsp;</li><li>Make sure the PLDM supported adapter is present in the server</li><li>Go to iLO GUI -&gt; Click on &quot;Firmware and OS software&quot; from left side&nbsp;&nbsp;-&gt; Click on &quot;Update Firmware&quot; -&gt; Click on &quot;Choose File&quot; and browse to the supported PLDM file -&gt; Then click on &quot;Flash&quot; button.&nbsp;</li><li>Update status will be show in the Top and a log entry can be seen in Integrated Managenment Log (IML)&nbsp;</li></ul>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"[Internal] Firmware Package - UBM6 Backplane PIC PLDM Firmware for Gen10/Gen10P/Gen11/Gen12 servers usage"},{"Lang":"ja","Value":"[Internal] Firmware Package - UBM6 Backplane PIC PLDM Firmware for Gen10/Gen10P/Gen11/Gen12 servers usage"},{"Lang":"cn","Value":"[Internal] Firmware Package - UBM6 Backplane PIC PLDM Firmware for Gen10/Gen10P/Gen11/Gen12 servers usage"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"11000"},"SupportedDevices":[{"Id":"9675b54e-1c96-44c3-a7a1-901506000000","TargetGUID":"","Type":"nvmeubmpicnew"}],"SupportedOperatingSystems":[{"Major":"0","Minor":"0","Name":"Cross Operating System","Platform":"oi","Sr":"OEM"},{"Major":"7","Minor":"0","Name":"VMware ESXi 7.0","Platform":"vmware_esx_server","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Microsoft Windows Server 2019","Platform":"nt_x86-64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server","Platform":"red_hat_enterprise_linux_x86_64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15","Platform":"suse_linux_enterprise_server_x86_64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Microsoft Windows Server 2022","Platform":"nt_x86-64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"VMware ESXi 8.0","Platform":"vmware_esx_server","Sr":"OEM"},{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 Server","Platform":"red_hat_enterprise_linux_x86_64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Microsoft Windows Server 2016","Platform":"nt_x86-64","Sr":"OEM"},{"Major":"7","Minor":"0","Name":"Red Hat Enterprise Linux 7 Server","Platform":"red_hat_enterprise_linux_x86_64","Sr":"OEM"},{"Major":"12","Minor":"0","Name":"SUSE Linux Enterprise Server 12","Platform":"suse_linux_enterprise_server_x86_64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Microsoft Windows Server 2025","Platform":"nt_x86-64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-12-05T03:01:49","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>Support SY480 Gen12 server.</p>","Fixes":"","Lang":"en"},{"Enhancements":"<p>SY480 Gen12 サーバーをサポートします。</p>","Fixes":"","Lang":"ja"},{"Enhancements":"<p>Support SY480 Gen12 server.</p>","Fixes":"","Lang":"cn"}],"Version":"1.04"},{"ReleaseNotes":[{"Enhancements":"<p>Private release for specific customers.</p>","Fixes":"","Lang":"en"},{"Enhancements":"<p>Private release for specific customers.</p>","Fixes":"","Lang":"ja"},{"Enhancements":"<p>Private release for specific customers.</p>","Fixes":"","Lang":"cn"}],"Version":"1.06"}],"SWKeys":[{"Name":"UBM6PIC","SWKeyExpectedPath":"firmware:sd:ubm"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"A56","Model":"HPE ProLiant DL325 Gen11 Server"},{"Family":"A56","Model":"HPE ProLiant DL345 Gen11 Server"},{"Family":"A55","Model":"HPE ProLiant DL385 Gen11 Server"},{"Family":"A55","Model":"HPE ProLiant DL365 Gen11 Server"},{"Family":"U54","Model":"HPE ProLiant DL380 Gen11 Server"},{"Family":"U54","Model":"HPE ProLiant DL360 Gen11 Server"},{"Family":"U54","Model":"HPE ProLiant ML350 Gen11 Server"},{"Family":"U63","Model":"HPE ProLiant DL320 Gen11 Server"},{"Family":"U58","Model":"HPE ProLiant DL380a Gen11"},{"Family":"U63","Model":"HPE ProLiant ML110 Gen11 Server"},{"Family":"U59","Model":"HPE ProLiant DL560 Gen11 Server"},{"Family":"I45","Model":"HPE Synergy 480 Gen11 Compute Module"},{"Family":"U46","Model":"HPE ProLiant DL380 Gen10 Plus Server"},{"Family":"U30","Model":"HPE ProLiant DL380 Gen10 Server"},{"Family":"A42","Model":"HPE ProLiant DL365 Gen10 Plus Server"},{"Family":"U46","Model":"HPE ProLiant DL360 Gen10 Plus Server"},{"Family":"U32","Model":"HPE ProLiant DL360 Gen10 Server"},{"Family":"A43","Model":"HPE ProLiant DL345 Gen10 Plus Server"},{"Family":"A43","Model":"HPE ProLiant DL325 Gen10 Plus v2 Server"},{"Family":"A42","Model":"HPE ProLiant DL385 Gen10 Plus v2 Server"},{"Family":"U46","Model":"HPE ProLiant with vSphere Distributed Services Engine"},{"Family":"U69","Model":"HPE ProLiant Compute DL320 Gen12 SP Server"},{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"U71","Model":"HPE ProLiant Compute DL320 Gen12 Server"},{"Family":"U71","Model":"HPE ProLiant Compute DL340 Gen12 Server"},{"Family":"U68","Model":"HPE ProLiant Compute DL360 Gen12"},{"Family":"U68","Model":"HPE ProLiant Compute DL380 Gen12"},{"Family":"U72","Model":"HPE ProLiant Compute DL580 Gen12"},{"Family":"U68","Model":"HPE ProLiant Compute ML350 Gen12"},{"Family":"I46","Model":"HPE Synergy 480 Gen12 Compute Module"}],"UpgradeRequirements":"Recommended"},"PackageFormat":"FWPKG-v2","Type":"Firmware","UpdatableBy":["Bmc"],"VersionId":"7b7e1b259798400e9d831a9ae7dc63e5"}]},{"ProductId":"db5d7ecf159645df89170658bd9673cb","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VV030720KYNYP","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"SP54308KHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3033-3732-304b594e5950","Version":"HPK6"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: VV030720KYNYP"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive models: VV030720KYNYP"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VV030720KYNYP Drive<br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6<br /><strong>Last Recommended or Critical Version:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; None<br /><strong>Previous Version of Firmware:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; None<br /><strong>Firmware Dependency:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; None</p><p><strong>Enhancements/New Features:</strong></p><p>&nbsp;&nbsp;&nbsp;&nbsp; None</p><p><strong>Problems Fixed:</strong></p><ul><li>HPK6 is a planned maintenance release that follows the HPK3 FW release for&nbsp;30.72TB (8K IU) Solid State Drive. This is a recommended FW release.</li><li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us\" style=\"color:blue; text-decoration:underline\">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us</a></li></ul><p><strong>Known Issues:</strong><br />&nbsp; &nbsp; &nbsp; None</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VV030720KYNYP Drive<br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6<br /><strong>Last Recommended or Critical Version:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; None<br /><strong>Previous Version of Firmware:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; None<br /><strong>Firmware Dependency:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; None</p><p><strong>Enhancements/New Features:</strong></p><p>&nbsp;&nbsp;&nbsp;&nbsp; None</p><p><strong>Problems Fixed:</strong></p><ul><li>HPK6 is a planned maintenance release that follows the HPK3 FW release for&nbsp;30.72TB (8K IU) Solid State Drive. This is a recommended FW release.</li><li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us\" style=\"color:blue; text-decoration:underline\">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us</a></li></ul><p><strong>Known Issues:</strong><br />&nbsp; &nbsp; &nbsp; None</p>"}],"Files":[{"Bytes":"4474365","DateModified":"2025-11-27T08:29:33","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/CP069875.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/SP54308KHPK6.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-399ac3ba76-HPK6-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP069875.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP069875.scexe"],"MD5Sum":"84e663638299dbc6a3b199eac487b40d","Name":"firmware-hdd-399ac3ba76-HPK6-1.1.aarch64.rpm","Release":"2025-11-27T12:21:27","Revision":"","SHA1Sum":"1505f27c75d988804e1622e6a5e540a51a7a8541","SHA256Sum":"af26c1f2e7cfd923fd4bd0bf83075b5ee9b9f773a8ff5bb90cbbb7bb8808a29d","Size":"4MB","TargetGUIDs":["562340a5-3056-3033-3732-304b594e5950"],"TypeOfChange":"1","Version":"HPK6"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux (arm64)- VV030720KYNYP Drive"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux (arm64)- VV030720KYNYP Drive"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VV030720KYNYP","TargetGUID":"562340a5-3056-3033-3732-304b594e5950","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"},{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-12-27T08:28:38","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>HPK6 is a planned maintenance release that follows the HPK3 FW release for&nbsp;30.72TB (8K IU) Solid State Drive. This is a recommended FW release.</li><li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us</a></li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>HPK6 is a planned maintenance release that follows the HPK3 FW release for&nbsp;30.72TB (8K IU) Solid State Drive. This is a recommended FW release.</li><li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us</a></li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>HPK6 is a planned maintenance release that follows the HPK3 FW release for&nbsp;30.72TB (8K IU) Solid State Drive. This is a recommended FW release.</li><li>For more information, refer to HPE Customer Advisory at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00150459en_us</a></li></ul>","Lang":"cn"}],"Version":"HPK6"}],"SWKeys":[{"Name":"VV030720KYNYP","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"57f6cbcbb2e34131b30d3804149dd923"}]},{"ProductId":"5fd6973f399648b5a19a88b5145387e6","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"MV003200LXUJK","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7ALEHPK7.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3330-3230-304c58554a4b","Version":"HPK7"},{"DeviceName":"MV006400LXUJL","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7ALEHPK7.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-3056-3630-3430-304c58554a4c","Version":"HPK7"},{"DeviceName":"VV003840LXUJE","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7ALEHPK7.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3330-3834-304c58554a45","Version":"HPK7"},{"DeviceName":"VV007680LXUJF","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7ALEHPK7.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3730-3638-304c58554a46","Version":"HPK7"},{"DeviceName":"VV015360LXUJH","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KACM7ALEHPK7.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3531-3336-304c58554a48","Version":"HPK7"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: MV003200LXUJK, MV006400LXUJL, VV003840LXUJE, VV007680LXUJF and VV015360LXUJH"},{"Lang":"ja","Value":"このarm64 Smartコンポーネントは、次のドライブモデルのファームウェアを提供します。MV003200LXUJK、MV006400LXUJL、VV003840LXUJE、VV007680LXUJF、およびVV015360LXUJH"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- MV003200LXUJK, MV006400LXUJL, VV003840LXUJE, VV007680LXUJF and VV015360LXUJH Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK7</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online&nbsp;HDD/SSD Flash Component for Linux (arm64)&nbsp;- MV003200LXUJK, MV006400LXUJL, VV003840LXUJE, VV007680LXUJF and VV015360LXUJH Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK7</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"9848812","DateModified":"2025-08-24T08:54:27","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/CP068497.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/KACM7ALEHPK7.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-44d456ce65-HPK7-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068497.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068497.scexe"],"MD5Sum":"7f6f63cd0f436c98f92a8d0d92cdbd4c","Name":"firmware-hdd-44d456ce65-0HPK7-1.1_arm64.deb","Release":"2025-08-24T12:51:04","Revision":"","SHA1Sum":"d444df601e4f81c7218ac26c430445d102756657","SHA256Sum":"1a20eef30b6163f00e897ada1c99486c4f0e1ce1a9ff7af0a47bdf81ee0c46a8","Size":"9MB","TargetGUIDs":["4d2340a5-3056-3330-3230-304c58554a4b","4d2340a5-3056-3630-3430-304c58554a4c","562340a5-3056-3330-3834-304c58554a45","562340a5-3056-3730-3638-304c58554a46","562340a5-3056-3531-3336-304c58554a48"],"TypeOfChange":"1","Version":"HPK7"}],"Installation":{"Command":"CP043255.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032c","SWKey":"032C1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032b","SWKey":"032B1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032a","SWKey":"032A1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900293","SWKey":"02931590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900383","SWKey":"03831590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900382","SWKey":"03821590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0651","SWKey":"0651103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0650","SWKey":"0650103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0652","SWKey":"0652103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0654","SWKey":"0654103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0700","SWKey":"0700103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0600","SWKey":"0600103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0603","SWKey":"0603103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0602","SWKey":"0602103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0601","SWKey":"0601103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1101","SWKey":"1101103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1100","SWKey":"1100103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900329","SWKey":"03291590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e2159003c8","SWKey":"03C81590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900328","SWKey":"03281590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900326","SWKey":"03261590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002db","SWKey":"02DB1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f1590032e","SWKey":"032E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900381","SWKey":"03811590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900294","SWKey":"02941590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002dc","SWKey":"02DC1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900379","SWKey":"03791590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900380","SWKey":"03801590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-2241159002f6","SWKey":"02F61590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030e","SWKey":"030E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030f","SWKey":"030F1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900310","SWKey":"03101590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900325","SWKey":"03251590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online HDD/SSD Flash Component for Linux deb (arm64) - MV003200LXUJK, MV006400LXUJL, VV003840LXUJE, VV007680LXUJF and VV015360LXUJH Drives"},{"Lang":"ja","Value":"オンラインHDD/SSDフラッシュコンポーネントfor Linux deb (arm64) - MV003200LXUJK、MV006400LXUJL、VV003840LXUJE、VV007680LXUJF、およびVV015360LXUJHドライブ"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VV007680LXUJF","TargetGUID":"562340a5-3056-3730-3638-304c58554a46","Type":"nvme"},{"Id":"VV015360LXUJH","TargetGUID":"562340a5-3056-3531-3336-304c58554a48","Type":"nvme"},{"Id":"MV006400LXUJL","TargetGUID":"4d2340a5-3056-3630-3430-304c58554a4c","Type":"nvme"},{"Id":"VV003840LXUJE","TargetGUID":"562340a5-3056-3330-3834-304c58554a45","Type":"nvme"},{"Id":"MV003200LXUJK","TargetGUID":"4d2340a5-3056-3330-3230-304c58554a4b","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-22T10:57:31","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance for fixing MCU,sanitize, DRAM and log page..etc.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance for fixing MCU,sanitize, DRAM and log page..etc.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Regular FW maintenance for fixing MCU,sanitize, DRAM and log page..etc.</li></ul>","Lang":"cn"}],"Version":"HPK7"}],"SWKeys":[{"Name":"MV003200LXUJK","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"MV006400LXUJL","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV003840LXUJE","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV007680LXUJF","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VV015360LXUJH","SWKeyExpectedPath":"firmware:sd:nvme"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"e5a09e901db048ed8df17d7b5a75aae2"}]},{"ProductId":"603fa5d97b1142a18f1bf257431b07a5","Versions":[{"DeviceClass":"e7a8b7dd-a6c0-4056-b14a-97bc423ddc7b","Devices":{"Device":[]},"Package":{"Category":[{"Lang":"en","Value":"Application - System Management"},{"Lang":"ja","Value":"アプリケーション - システム マネジメント"},{"Lang":"cn","Value":"应用程序 - 系统管理"}],"Description":[{"Lang":"en","Value":"Integrated Smart Update Tools (iSUT) is an application which enables firmware and software deployment via the iLO management network using the server’s local administrator credentials. "},{"Lang":"ja","Value":"統合Smart Update Tools (iSUT) は、サーバーのローカル管理者の認証情報を使用してiLO の管理ネットワーク経由でファームウェアとソフトウェアの展開を可能にするアプリケーションです。"},{"Lang":"cn","Value":"Integrated Smart Update Tools (iSUT) is an application which enables firmware and software deployment via the iLO management network using the server’s local administrator credentials. "}],"Divisions":[{"Division":[{"Lang":"en","Value":"Lights Out"},{"Lang":"ja","Value":"Lights Out"},{"Lang":"cn","Value":"Lights Out"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"9535375","DateModified":"2026-02-10T02:49:26","FileList":["./opt/hp/hpsut/README.txt","./opt/sut/README.txt","./opt/sut/bin/26C2B797.pub","./opt/sut/bin/74C3A4A2.pub","./opt/sut/bin/B1275EA3.pub","./opt/sut/bin/gatherlogs.sh","./opt/sut/bin/hpsut","./opt/sut/bin/sut","./opt/sut/bin/x64/sum_drop_table_x64","./opt/sut/config/sut_cfg_default.dat","./opt/sut/doc/OnDemandHelp.txt","./opt/sut/schemas/SUT.json","./opt/sut/schemas/SUTProvider.json","./opt/sut/schemas/SUTProvider_Gen10.json","./opt/sut/schemas/SUTRegistryEN_Legacy_zipped.json.gz","./opt/sut/schemas/SUTRegistryEN_Redfish.json","./opt/sut/schemas/SUTRegistryEN_Redfish_zipped.json.gz","./opt/sut/schemas/SUTRegistryJP_Legacy_zipped.json.gz","./opt/sut/schemas/SUTRegistryJP_Redfish_zipped.json.gz","./opt/sut/schemas/SUTSchema_Legacy_zipped.json.gz","./opt/sut/schemas/SUTSchema_Redfish_zipped.json.gz","./opt/sut/schemas/SUTSettings.json","./opt/sut/schemas/SUTSettingsSchema_Legacy_zipped.json.gz","./opt/sut/schemas/SUTSettingsSchema_Redfish_zipped.json.gz","./opt/sut/schemas/SUTSettings_Gen10.json","./opt/sut/schemas/SUTSystemInventorySchema_Legacy_zipped.json.gz","./opt/sut/schemas/SUTSystemInventorySchema_Redfish_zipped.json.gz","./opt/sut/schemas/SUTTasksettings.json","./opt/sut/schemas/SUTTasksettings_Legacy_zipped.json.gz","./opt/sut/schemas/SUTTasksettings_Redfish_zipped.json.gz","./opt/sut/schemas/SUT_Gen10.json","./opt/sut/scripts/sut.service","./opt/sut/scripts/sutd","./usr/lib/.build-id","./usr/lib/.build-id/57","./usr/lib/.build-id/57/374c6b2b55c3ea60f4ebaa7dfd1667b9b459f6","./usr/lib/.build-id/e9","./usr/lib/.build-id/e9/17b7715889ae16280d152c259fe8d49ae235e3","./usr/share/man/man8/sut.8.gz","./usr/share/smartupdate/sut/component.xml"],"MD5Sum":"21b03b550d8f5e773147bd83bd884538","Name":"sut-6.5.0-38.linux.aarch64.rpm","Release":"2026-02-10T06:44:05","Revision":"","SHA1Sum":"ecc845b9f418464716fdb8e1ea37aed9927324b8","SHA256Sum":"181702ae3dcca79f0677924316a08fab420689e6f166922c782576183210dfc6","Size":"9MB","TargetGUIDs":["20a6e8e4-bf33-4c71-a6bf-d9ece09b5689"],"TypeOfChange":"1","Version":"6.5.0"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{},"PerDeviceInstallTimeSeconds":0,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p>Download the rpm package to a directory on your hard drive and change to that directory. Install by typing rpm -Uvh sut-XXX.aarch64.rpm.</p>"},{"Lang":"ja","Value":"<p>RPMパッケージをご使用のローカルドライブディレクトリにダウンロードし、そのディレクトリに移動します。\"rpm -Uvh sut-XXX.aarch64.rpm.\"とタイプしてインストールします。</p>"},{"Lang":"cn","Value":"<p>Download the rpm package to a directory on your hard drive and change to that directory. Install by typing rpm -Uvh sut-XXX.aarch64.rpm.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Integrated Smart Update Tools for Linux ARM64"},{"Lang":"ja","Value":"Integrated Smart Update Tools for Linux ARM64"},{"Lang":"cn","Value":"Integrated Smart Update Tools for Linux ARM64"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"0"},"SupportedDevices":[{"Dev":"3307","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3307159000e4","Type":"pci","Ven":"103C"},{"Dev":"3307","SubDev":"0000","SubVen":"0000","TargetGUID":"a6b1a447-382a-5a4f-103C-330700000000","Type":"pci","Ven":"103C"},{"Dev":"3306","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3306159000e4","Type":"pci","Ven":"103C"},{"Dev":"3306","SubDev":"0000","SubVen":"0000","TargetGUID":"a6b1a447-382a-5a4f-103C-330600000000","Type":"pci","Ven":"103C"},{"Dev":"3306","SubDev":"03BA","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3306159003ba","Type":"pci","Ven":"103c"},{"Dev":"3307","SubDev":"03BA","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3307159003ba","Type":"pci","Ven":"103c"},{"Dev":"3306","SubDev":"3307","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-330615903307","Type":"pci","Ven":"103c"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"16","Minor":"0","Name":"SUSE Linux Enterprise Server 16 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-12-06T08:12:35","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Fixes":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Lang":"en"},{"Enhancements":"<p>今回のリリースで解決した問題については、<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&t=All&sort=relevancy&numberOfResults=25\">iSUT Release Notes</a>を参照してください。</p>","Fixes":"<p>今回のリリースで解決した問題については、<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&t=All&sort=relevancy&numberOfResults=25\">iSUT Release Notes</a>を参照してください。</p>","Lang":"ja"},{"Enhancements":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Fixes":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Lang":"cn"}],"Version":"5.3.0"},{"ReleaseNotes":[{"Enhancements":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Fixes":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Lang":"en"},{"Enhancements":"<p>今回のリリースで解決した問題については、<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&t=All&sort=relevancy&numberOfResults=25\">iSUT Release Notes</a>を参照してください。</p>","Fixes":"<p>今回のリリースで解決した問題については、<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&t=All&sort=relevancy&numberOfResults=25\">iSUT Release Notes</a>を参照してください。</p>","Lang":"ja"},{"Enhancements":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Fixes":"<p>See the&nbsp;<a href=\"https://support.hpe.com/connect/s/search?language=en_US#q=integrated%20smart%20update%20tools&amp;t=All&amp;sort=relevancy&amp;numberOfResults=25\">iSUT Release Notes&nbsp;</a>for information about the issues resolved in this release</p>","Lang":"cn"}],"Version":"6.5.0"}],"SWKeys":[{"Name":"sut","SWKeyExpectedPath":"software:rpm"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"Software","UpdatableBy":["RuntimeAgent"],"VersionId":"77ad31a265cf4da1ae89bd6c8d89b33f"}]},{"ProductId":"ecec706965b04c0d93b1cd8a95470b7c","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VO001920KYDMT","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-304f-3130-3932-304b59444d54","Version":"HPK6"},{"DeviceName":"VO003840KYDMV","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-304f-3330-3834-304b59444d56","Version":"HPK6"},{"DeviceName":"MO001600KYDMU","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-304f-3130-3630-304b59444d55","Version":"HPK6"},{"DeviceName":"MO003200KYDNC","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-304f-3330-3230-304b59444e43","Version":"HPK6"},{"DeviceName":"MO006400KYDND","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-304f-3630-3430-304b59444e44","Version":"HPK6"},{"DeviceName":"VO007680KYDNA","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-304f-3730-3638-304b59444e41","Version":"HPK6"},{"DeviceName":"VO015360KYDNB","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM173XAHPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-304f-3531-3336-304b59444e42","Version":"HPK6"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: VO001920KYDMT, VO003840KYDMV, MO001600KYDMU, MO003200KYDNC, MO006400KYDND, VO007680KYDNA and VO015360KYDNB"},{"Lang":"ja","Value":"このarm64 Smartコンポーネントは、次のドライブモデルのファームウェアを提供します。VO001920KYDMT、VO003840KYDMV、MO001600KYDMU、MO003200KYDNC、MO006400KYDND、VO007680KYDNA、およびVO015360KYDNB"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VO001920KYDMT, VO003840KYDMV, MO001600KYDMU, MO003200KYDNC, MO006400KYDND, VO007680KYDNA and VO015360KYDNB Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VO001920KYDMT, VO003840KYDMV, MO001600KYDMU, MO003200KYDNC, MO006400KYDND, VO007680KYDNA and VO015360KYDNB Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"6065943","DateModified":"2025-10-13T02:41:18","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/CP068494.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/GPM173XAHPK6.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-a27c95663d-HPK6-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068494.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068494.scexe"],"MD5Sum":"7a73c0ee28e95d7bf085af2ce7f7b1a5","Name":"firmware-hdd-a27c95663d-HPK6-1.1.aarch64.rpm","Release":"2025-10-13T06:33:04","Revision":"","SHA1Sum":"32b187d0bf2162f2a63b4c83da7d561c9738c53a","SHA256Sum":"8e82f135f51cfaf20fed23aad13737c06dec068d4221836a70979f07fe984606","Size":"5MB","TargetGUIDs":["562340a5-304f-3130-3932-304b59444d54","562340a5-304f-3330-3834-304b59444d56","4d2340a5-304f-3130-3630-304b59444d55","4d2340a5-304f-3330-3230-304b59444e43","4d2340a5-304f-3630-3430-304b59444e44","562340a5-304f-3730-3638-304b59444e41","562340a5-304f-3531-3336-304b59444e42"],"TypeOfChange":"1","Version":"HPK6"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux (arm64) - VO001920KYDMT, VO003840KYDMV, MO001600KYDMU, MO003200KYDNC, MO006400KYDND, VO007680KYDNA and VO015360KYDNB Drives"},{"Lang":"ja","Value":"オンラインNVMe SSDフラッシュコンポーネントfor Linux (arm64) - VO001920KYDMT、VO003840KYDMV、MO001600KYDMU、MO003200KYDNC、MO006400KYDND、VO007680KYDNA、およびVO015360KYDNBドライブ"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"MO001600KYDMU","TargetGUID":"4d2340a5-304f-3130-3630-304b59444d55","Type":"nvme"},{"Id":"MO006400KYDND","TargetGUID":"4d2340a5-304f-3630-3430-304b59444e44","Type":"nvme"},{"Id":"VO015360KYDNB","TargetGUID":"562340a5-304f-3531-3336-304b59444e42","Type":"nvme"},{"Id":"VO007680KYDNA","TargetGUID":"562340a5-304f-3730-3638-304b59444e41","Type":"nvme"},{"Id":"MO003200KYDNC","TargetGUID":"4d2340a5-304f-3330-3230-304b59444e43","Type":"nvme"},{"Id":"VO001920KYDMT","TargetGUID":"562340a5-304f-3130-3932-304b59444d54","Type":"nvme"},{"Id":"VO003840KYDMV","TargetGUID":"562340a5-304f-3330-3834-304b59444d56","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-22T09:15:19","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Previous firmware version HPK5 may cause Uncorrectable Machine Check Exception (UMCE) to occur. It is recommended to update firmware version to HPK6.</li><li>For more information, CA is published&nbsp;at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us\" id=\"menur8o\" rel=\"noreferrer noopener\" target=\"_blank\" title=\"https://support.hpe.com/hpesc/public/docdisplay?docid=a00142315en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us</a></li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Previous firmware version HPK5 may cause Uncorrectable Machine Check Exception (UMCE) to occur. It is recommended to update firmware version to HPK6.</li><li>For more information, CA is published&nbsp;at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us\" id=\"menur8o\" rel=\"noreferrer noopener\" target=\"_blank\" title=\"https://support.hpe.com/hpesc/public/docdisplay?docid=a00142315en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us</a></li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Previous firmware version HPK5 may cause Uncorrectable Machine Check Exception (UMCE) to occur. It is recommended to update firmware version to HPK6.</li><li>For more information, CA is published&nbsp;at the following URL:&nbsp;<a href=\"https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us\" id=\"menur8o\" rel=\"noreferrer noopener\" target=\"_blank\" title=\"https://support.hpe.com/hpesc/public/docdisplay?docid=a00142315en_us\">https://support.hpe.com/hpesc/public/docDisplay?docId=a00142315en_us</a></li></ul>","Lang":"cn"}],"Version":"HPK6"}],"SWKeys":[{"Name":"VO001920KYDMT","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VO003840KYDMV","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MO001600KYDMU","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MO003200KYDNC","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MO006400KYDND","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VO007680KYDNA","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VO015360KYDNB","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"ea5095bc20e044d0a817ff02b62e8fea"}]},{"ProductId":"a6a2f5a871c449f7b8239daa1afec71c","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VR000480KXLXF","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM9A3SAHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3438-304b584c5846","Version":"HPK4"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000480KXLXF"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000480KXLXF"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VR000480KXLXF&nbsp;Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK4</p><p><br />&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VR000480KXLXF&nbsp;Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK4</p><p><br />&nbsp;</p>"}],"Files":[{"Bytes":"6133909","DateModified":"2025-10-13T04:01:07","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/CP068504.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/GPM9A3SAHPK4.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-5adaf7ae6f-HPK4-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068504.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068504.scexe"],"MD5Sum":"dbf5ebc596a0d4e57902df1716e819d3","Name":"firmware-hdd-5adaf7ae6f-HPK4-1.1.aarch64.rpm","Release":"2025-10-13T07:52:53","Revision":"","SHA1Sum":"fba1b67c99d425a40f8c2aaa84fa76cb5038f4ed","SHA256Sum":"400f0dbf3efe90147f578f7bbb371ff921900658dcd02493a461615fa5b10d08","Size":"5MB","TargetGUIDs":["562340a5-3052-3030-3438-304b584c5846"],"TypeOfChange":"1","Version":"HPK4"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux (arm64) - VR000480KXLXF Drive"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux (arm64) - VR000480KXLXF Drive"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VR000480KXLXF","TargetGUID":"562340a5-3052-3030-3438-304b584c5846","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-24T21:52:30","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>This FW update contains the fix for false ILO message of temporary drive &quot;degraded&quot; status.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>This FW update contains the fix for false ILO message of temporary drive &quot;degraded&quot; status.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>This FW update contains the fix for false ILO message of temporary drive &quot;degraded&quot; status.</li></ul>","Lang":"cn"}],"Version":"HPK4"}],"SWKeys":[{"Name":"VR000480KXLXF","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"c581bece26754183b03cf3f3f57548c2"}]},{"ProductId":"4e6efe09c32f45c293caefe372d45bde","Versions":[{"DeviceClass":"e7a8b7dd-a6c0-4056-b14a-97bc423ddc7b","Devices":{"Device":[]},"Package":{"Category":[{"Lang":"en","Value":"Software - System Management"},{"Lang":"ja","Value":"ソフトウェア - システム マネジメント"},{"Lang":"cn","Value":"软件 - 系统管理"}],"Description":[{"Lang":"en","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."},{"Lang":"ja","Value":"Agentless Management Service（AMSD）は、Integrated Lights Out 6（iLO 6）内蔵ヘルスおよびアラートのサポートを提供します。"},{"Lang":"cn","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Lights Out"},{"Lang":"ja","Value":"Lights Out"},{"Lang":"cn","Value":"Lights Out"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"9173179","DateModified":"2026-02-17T11:09:20","FileList":["./etc/sysconfig/ahslog","./etc/sysconfig/amsd","./etc/sysconfig/amsd_rev","./etc/sysconfig/cpqFca","./etc/sysconfig/cpqFca_rev","./etc/sysconfig/cpqIde","./etc/sysconfig/cpqIde_rev","./etc/sysconfig/cpqiScsi","./etc/sysconfig/smad","./etc/sysconfig/smad_rev","./opt/amsd","./opt/amsd/amsd.license","./sbin/ahslog","./sbin/amscli","./sbin/cpqiScsi","./usr/lib/.build-id","./usr/lib/.build-id/33","./usr/lib/.build-id/33/7a3ad375586c3ecd547600bab042e9d24b0007","./usr/lib/.build-id/33/7a3ad375586c3ecd547600bab042e9d24b0007.1","./usr/lib/.build-id/51","./usr/lib/.build-id/51/c23d59109d3a946004f35e64b66e3c5b819179","./usr/lib/.build-id/69","./usr/lib/.build-id/69/00066038ac41edc70af210b35e45dc6d5c27e9","./usr/lib/.build-id/69/00066038ac41edc70af210b35e45dc6d5c27e9.1","./usr/lib/.build-id/6b","./usr/lib/.build-id/6b/3f789f1e88b45cba9fd7d72bc92de645cafc7b","./usr/lib/.build-id/7f","./usr/lib/.build-id/7f/4f4d94f83454a099bdd2f990f565672c7f0780","./usr/lib/.build-id/7f/4f4d94f83454a099bdd2f990f565672c7f0780.1","./usr/lib/.build-id/8e","./usr/lib/.build-id/8e/8639e78618d8f9e0c5de4f93c134770da64455","./usr/lib/.build-id/8e/8639e78618d8f9e0c5de4f93c134770da64455.1","./usr/lib/.build-id/c6","./usr/lib/.build-id/c6/cb54646745f69a128eae63de054d30666bfc85","./usr/lib/systemd/system/ahslog.service","./usr/lib/systemd/system/amsd.service","./usr/lib/systemd/system/amsd_rev.service","./usr/lib/systemd/system/cpqFca.service","./usr/lib/systemd/system/cpqFca_rev.service","./usr/lib/systemd/system/cpqIde.service","./usr/lib/systemd/system/cpqIde_rev.service","./usr/lib/systemd/system/cpqiScsi.service","./usr/lib/systemd/system/smad.service","./usr/lib/systemd/system/smad_rev.service","./usr/lib/udev/rules.d/81-cpqFca.rules","./usr/lib/udev/rules.d/81-cpqiScsi.rules","./usr/share/man/man8/ahslog.8.gz","./usr/share/man/man8/amsd.8.gz","./usr/share/man/man8/cpqFca.8.gz","./usr/share/man/man8/cpqIde.8.gz","./usr/share/man/man8/cpqiScsi.8.gz","./usr/share/man/man8/smad.8.gz","./usr/share/smartupdate/amsd/component.xml","./sbin/amsd","./sbin/amsd_rev","./sbin/cpqFca","./sbin/cpqFca_rev","./sbin/cpqIde","./sbin/cpqIde_rev","./sbin/smad","./sbin/smad_rev"],"MD5Sum":"83449a47276b42cd93395c5618652bc5","Name":"amsd-4.5.0-2120.1.rhel9.aarch64.rpm","Release":"2026-02-17T15:00:21","Revision":"","SHA1Sum":"2206338b9b3f18ec29bbafff4f45b75db2be3fe5","SHA256Sum":"33c41b0795e019e92f6e4b150ece3262e9615b33046b4b5759d299f60389c115","Size":"8MB","TargetGUIDs":["20a6e8e4-bf33-4c71-a6bf-d9ecb37bf5ae"],"TypeOfChange":"0","Version":"4.5.0"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{},"PerDeviceInstallTimeSeconds":0,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p>Login as the system administrator (root), download the RPM to a directory on your hard drive and change to that directory.</p><ul><li>To install the package type:<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-&lt;version&gt;.rpm</li></ul></li><li>To check whether the package is loaded properly type:<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>Additional help is available by typing:<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"},{"Lang":"ja","Value":"<p>システム管理者（root）としてログインし、RPMをハードディスク上のディレクトリにダウンロードした後、そのディレクトリに移動します。</p><ul><li>パッケージをインストールするには、次のようにタイプします。<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-<version>.rpm</li></ul></li><li>パッケージが正しくロードされているか、以下をタイプして確認します。<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>以下のコマンドを実行してヘルプを参照してください。<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"},{"Lang":"cn","Value":"<p>Login as the system administrator (root), download the RPM to a directory on your hard drive and change to that directory.</p><ul><li>To install the package type:<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-&lt;version&gt;.rpm</li></ul></li><li>To check whether the package is loaded properly type:<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>Additional help is available by typing:<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Agentless Management Service (iLO 6) for Red Hat Enterprise Linux 9 Server for ARM-based Servers"},{"Lang":"ja","Value":"ARMベースのサーバー用のAgentless Management Service (iLO 6) for Red Hat Enterprise Linux 9 Server"},{"Lang":"cn","Value":"Agentless Management Service (iLO 6) for Red Hat Enterprise Linux 9 Server for ARM-based Servers"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"0"},"SupportedDevices":[{"Id":"2f317b9d-c9e3-4d76-bff6-b9d0d085a952","TargetGUID":"","Type":"other"},{"Id":"2f317b9d-c9e3-4d76-bff6-b9d0d085a952","TargetGUID":"","Type":"other"},{"Dev":"3306","SubDev":"3307","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-330615903307","Type":"pci","Ven":"103c"},{"Dev":"3307","SubDev":"3307","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-330715903307","Type":"pci","Ven":"103c"},{"Dev":"3306","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3306159000e4","Type":"pci","Ven":"103C"},{"Dev":"3307","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3307159000e4","Type":"pci","Ven":"103C"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2026-03-05T07:35:17","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"en"},{"Enhancements":"<p>HPE ProLiant Compute DL384 Gen12サーバーのAMS認定</p>","Fixes":"<p>非NVMeローカルドライブのホットアド/リムーブ時にamsdがクラッシュする問題を修正。</p>","Lang":"ja"},{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"cn"}],"Version":"3.5.0"},{"ReleaseNotes":[{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"en"},{"Enhancements":"<p>HPE ProLiant Compute DL384 Gen12サーバーのAMS認定</p>","Fixes":"<p>非NVMeローカルドライブのホットアド/リムーブ時にamsdがクラッシュする問題を修正。</p>","Lang":"ja"},{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"cn"}],"Version":"4.5.0"}],"SWKeys":[{"Name":"amsd","SWKeyExpectedPath":"software:rpm"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"Software","UpdatableBy":["RuntimeAgent"],"VersionId":"c2a523d1576f417289d84ef20109a108"}]},{"ProductId":"a5747f530b554b468913296ae995623a","Versions":[{"DeviceClass":"aa148d2e-6e09-453e-bc6f-63baa5f5ccc4","Devices":{"Device":[{"DeviceName":"System BIOS - R13","FirmwareImages":[{"DelayAfterInstallSec":0,"DirectFlashOK":true,"FileName":"R13_1.30_02_05_2026.signed.flash","InstallDurationSec":300,"Order":1,"PLDMImage":false,"ResetRequired":true,"ServerPowerOff":false,"SysPowerOn":false,"Type":"Firmware","UEFIFlashable":true}],"Target":"00000000-0000-0000-0000-000000000272","Version":"v1.30 (02/05/2026)"}]},"Package":{"Category":[{"Lang":"en","Value":"BIOS - System ROM"}],"Description":[{"Lang":"en","Value":"This firmware package provides updated system firmware that can be installed online through the use of tools such as Smart Update Manager (SUM) and the RESTful Interface Tool (iLOrest) on supported Operating Systems. Additionally, when used in conjunction with SUM or iLOrest, this firmware package allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update."},{"Lang":"ja","Value":"This firmware package provides updated system firmware that can be installed online through the use of tools such as Smart Update Manager (SUM) and the RESTful Interface Tool (iLOrest) on supported Operating Systems. Additionally, when used in conjunction with SUM or iLOrest, this firmware package allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update."},{"Lang":"cn","Value":"This firmware package provides updated system firmware that can be installed online through the use of tools such as Smart Update Manager (SUM) and the RESTful Interface Tool (iLOrest) on supported Operating Systems. Additionally, when used in conjunction with SUM or iLOrest, this firmware package allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"67135808","DateModified":"2026-02-06T08:10:21","FileList":["payload.json","R13_1.30_02_05_2026.signed.flash","R13_1.30_02_05_2026.xml"],"MD5Sum":"d0c464eb9a3a4374a9299e5354cdac18","Name":"R13_1.30_02_05_2026.fwpkg","Release":"2026-02-06T08:07:02","Revision":"","SHA1Sum":"2922bc07a068b9c158012249be5ed1f7a8ef9319","SHA256Sum":"79df346810ef12b7fd09dd3c63146efffadf0cc72311011080759371edcd3088","Size":"64MB","TargetGUIDs":["00000000-0000-0000-0000-000000000272"],"TypeOfChange":"1","Version":"1.30_02-05-2026"}],"Installation":{"Command":"cpqsetup.exe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":300,"RebootDetails":[{"Lang":"en","Value":"Reboot is required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要です。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"yes","RebootRequirement":"Required"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.0","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.0","OSVersion":{"Name":"VMware","Value":"5.0"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.0.3.9-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.0","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.0","OSVersion":{"Name":"VMware","Value":"5.0"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecf961a5f4","SWKey":"char-hpcru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.0.3.9-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.1","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.1","OSVersion":{"Name":"VMware","Value":"5.1"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.0.3.9-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.1","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.1","OSVersion":{"Name":"VMware","Value":"5.1"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecf961a5f4","SWKey":"char-hpcru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.0.3.9-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.5","OSVersion":{"Name":"VMware","Value":"5.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.5.4.1-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.5","OSVersion":{"Name":"VMware","Value":"5.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecf961a5f4","SWKey":"char-hpcru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.5.4.1-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 5.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 5.5","OSVersion":{"Name":"VMware","Value":"5.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec53c3d5a6","SWKey":"cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"5.5.4.1-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.0","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.0","OSVersion":{"Name":"VMware","Value":"6.0"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec53c3d5a6","SWKey":"cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.0.8.0-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.0","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.0","OSVersion":{"Name":"VMware","Value":"6.0"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.0.8.0-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.5","OSVersion":{"Name":"VMware","Value":"6.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec53c3d5a6","SWKey":"cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.5.8.0-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.5","OSVersion":{"Name":"VMware","Value":"6.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.5.8.0-1OEM"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.5","OSVersion":{"Name":"VMware","Value":"6.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec53c3d5a6","SWKey":"cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"650.6.5.8"},{"Condition":"AlreadyActive","Description":"HP CRU Driver for VMware ESXi 6.5","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP CRU Driver for VMware ESXi 6.5","OSVersion":{"Name":"VMware","Value":"6.5"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecbe6e85ad","SWKey":"hpe-cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"650.6.5.8"},{"Condition":"AlreadyActive","Description":"HPE CRU Driver Bundle Smart Component for ESXi 7.0 version 700.10.16-1OEM.700.0.0.14828939 or greater is required and should be already active","DeviceGUID":"","Message":"HPE CRU Driver Bundle Smart Component for ESXi 7.0 version 700.10.16-1OEM.700.0.0.14828939 or greater is required and should be already active","OSVersion":{"Name":"VMware","Value":"7.0"},"RequirementGUID":"","SWKey":"cru-driver","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"700.10.16-1OEM.700.0.0.14828939"},{"Condition":"AlreadyActive","Description":"HPE CRU Driver Bundle Smart Component for ESXi 7.0 version 700.10.16-1OEM.700.0.0.14828939 or greater is required and should be already active","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HPE CRU Driver Bundle Smart Component for ESXi 7.0 version 700.10.16-1OEM.700.0.0.14828939 or greater is required and should be already active","OSVersion":{"Name":"VMware","Value":"7.0"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec53c3d5a6","SWKey":"cru","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"700.10.16-1OEM.700.0.0.14828939"}]},{"ListConditional":"OR","Requirement":[{"Condition":"InstalledBefore","Description":"HP ProLiant Integrated Lights-Out Management Interface Driver for Windows","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP ProLiant Integrated Lights-Out Management Interface Driver for Windows","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ece65aa5f6","SWKey":"hpqilo3chif.sys","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HP Lights-Out Drivers and Agents for Linux","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP Lights-Out Drivers and Agents for Linux","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec587429e7","SWKey":"cpqci","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HP Lights-Out Drivers and Agents for Linux","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP Lights-Out Drivers and Agents for Linux","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9eca0b72f1f","SWKey":"hp_ilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HP Lights-Out Drivers and Agents for Linux","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP Lights-Out Drivers and Agents for Linux","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec6d7bdce8","SWKey":"hpilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HP Channel Interface Driver for VMWare","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP Channel Interface Driver for VMWare","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecf1c92383","SWKey":"char-hpilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HPE Channel Interface Driver for VMware","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HPE Channel Interface Driver for VMware","OSVersion":{},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec2fe7fb84","SWKey":"hpe-ilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HPE Channel Interface Driver for VMware","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HPE Channel Interface Driver for VMware","OSVersion":{"Name":"VMware","Value":"*"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecb1b2cabc","SWKey":"ilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HPE Channel Interface Driver for VMware","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HPE Channel Interface Driver for VMware","OSVersion":{"Name":"VMware","Value":"*"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ecb1b2cabc","SWKey":"ilo","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"AlreadyActive","Description":"HPE iLO Driver Bundle Smart Component for ESXi 7.0 version 700.10.1.0.16-1OEM.700.0.0.14828939 or greater is required and should be already active","DeviceGUID":"","Message":"HPE iLO Driver Bundle Smart Component for ESXi 7.0 version 700.10.1.0.16-1OEM.700.0.0.14828939 or greater is required and should be already active","OSVersion":{"Name":"VMware","Value":"*"},"RequirementGUID":"","SWKey":"ilo-driver","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"},{"Condition":"InstalledBefore","Description":"HP ProLiant iLO 5 Channel Interface Driver for Windows must be installed prior to this component","DeviceGUID":"E7A8B7DD-A6C0-4056-B14A-97BC423DDC7B","Message":"HP ProLiant iLO 5 Channel Interface Driver for Windows must be installed prior to this component","OSVersion":{"Name":"Windows","Value":"*"},"RequirementGUID":"20a6e8e4-bf33-4c71-a6bf-d9ec1417651e","SWKey":"necheschif.sys","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"*"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p>To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>localhost OS example:<br /><strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p><p>remote example:<br /><strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO6_IP_Address&gt; -u &lt;iLO6_username&gt; -p &lt;iLO6_password&gt;</em></strong></p><p><br />This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p><p><strong>Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p><ul><li>Place the Service Pack for ProLiant on a USB key using the&nbsp;<strong><a href=\"https://support.hpe.com/hpesc/public/home/driverHome?pmasr=0&amp;sp4ts.oid=1008862658\">USB Key Creator Utility</a></strong>.</li><li>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\\packages&quot; on the USB key.</li></ul><p>Update the firmware and software&nbsp;in the usual manner.</p><p>Reboot your system for the update to take effect immediately.</p>"},{"Lang":"ja","Value":"<p>このファームウェアパッケージをフラッシュするには、次のiLOrestコマンドを使用します。 iLOrestツールの最新バージョンをダウンロードするには、<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>を参照してください。</p><p>ローカルホストOSの例：<br /><strong><em>ilorest flashfwpkg <file_name.fwpkg> </em></strong></p><p>リモートの例：<br /><strong><em>ilorest flashfwpkg <file_name.fwpkg> --url <iLO6_IP_Address> -u <iLO6_username> -p <iLO6_password></em></strong></p><p><br />このファームウェアパッケージは、Smart Update Manager (SUM) の最新バージョンでもインストールできます。</p><p>サポートされるProLiantサーバーおよびオプションのための<strong>サプリメンタルアップデート</strong>は、<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong> (SPP) ISO上にあるSUMを使用して実行できます。</p><ul><li><strong><a href=\"https://support.hpe.com/hpesc/public/home/driverHome?pmasr=0&sp4ts.oid=1008862658\">USB Key Creator Utility</a></strong>を使用して、Service Pack for ProLiantをUSBキーにコピーします。</li><li>アップデートに必要なファームウェアパッケージおよびコンポーネントをUSBキーの\"\\packages\"ディレクトリにコピーします。</li></ul><p>通常の手順でファームウェアおよびソフトウェアをアップデートします。</p><p>アップデートを直ちに有効にするにはシステムを再起動してください。</p>"},{"Lang":"cn","Value":"<p>To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>localhost OS example:<br /><strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p><p>remote example:<br /><strong><em>ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO6_IP_Address&gt; -u &lt;iLO6_username&gt; -p &lt;iLO6_password&gt;</em></strong></p><p><br />This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p><p><strong>Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p><ul><li>Place the Service Pack for ProLiant on a USB key using the&nbsp;<strong><a href=\"https://support.hpe.com/hpesc/public/home/driverHome?pmasr=0&amp;sp4ts.oid=1008862658\">USB Key Creator Utility</a></strong>.</li><li>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\\packages&quot; on the USB key.</li></ul><p>Update the firmware and software&nbsp;in the usual manner.</p><p>Reboot your system for the update to take effect immediately.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"ROM Flash Firmware Package - HPE ProLiant Compute DL384 Gen12 (R13) Servers"},{"Lang":"ja","Value":"ROM Flash Firmware Package - HPE ProLiant Compute DL384 Gen12 (R13) Servers"},{"Lang":"cn","Value":"ROM Flash Firmware Package - HPE ProLiant Compute DL384 Gen12 (R13) Servers"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"11000"},"SupportedOperatingSystems":[{"Major":"0","Minor":"0","Name":"Cross Operating System","Platform":"oi","Sr":"OEM"},{"Major":"7","Minor":"0","Name":"VMware ESXi 7.0","Platform":"vmware_esx_server","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"VMware ESXi 8.0","Platform":"vmware_esx_server","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2026-03-06T07:56:41","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>Redesigned system cable routing detection for invalid configurations.</p>","Fixes":"<p><strong>Important Notes:</strong></p><p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">Security Bulletin Library | HPE Support</a>.</p></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Resolved an issue where the UUID was missing after reconfiguring the NVMe-oF initiator name.</p><p>Resolved an issue where the system hung during Power-On Self Test (POST) when running SUSE on NVMe-oF.</p><p>Addressed an issue where the system hung during Power-On Self Test (POST) on configurations with 1xGH200/2EDSFF-Balance/2xPCIe Slots.</p><p><strong>Known Issues:</strong></p>None","Lang":"en"},{"Enhancements":"<p>Redesigned system cable routing detection for invalid configurations.</p>","Fixes":"<p><strong>Important Notes:</strong></p><p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">Security Bulletin Library | HPE Support</a>.</p></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Resolved an issue where the UUID was missing after reconfiguring the NVMe-oF initiator name.</p><p>Resolved an issue where the system hung during Power-On Self Test (POST) when running SUSE on NVMe-oF.</p><p>Addressed an issue where the system hung during Power-On Self Test (POST) on configurations with 1xGH200/2EDSFF-Balance/2xPCIe Slots.</p><p><strong>Known Issues:</strong></p>None","Lang":"ja"},{"Enhancements":"<p>Redesigned system cable routing detection for invalid configurations.</p>","Fixes":"<p><strong>Important Notes:</strong></p><p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">Security Bulletin Library | HPE Support</a>.</p></p><p><strong>Firmware Dependencies:</strong></p>None<p><strong>Problems Fixed:</strong></p><p>Resolved an issue where the UUID was missing after reconfiguring the NVMe-oF initiator name.</p><p>Resolved an issue where the system hung during Power-On Self Test (POST) when running SUSE on NVMe-oF.</p><p>Addressed an issue where the system hung during Power-On Self Test (POST) on configurations with 1xGH200/2EDSFF-Balance/2xPCIe Slots.</p><p><strong>Known Issues:</strong></p>None","Lang":"cn"}],"Version":"1.28_11-28-2025"},{"ReleaseNotes":[{"Enhancements":"","Fixes":"<p><strong>Important Notes:</strong></p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">Security Bulletin Library | HPE Support</a>.</p><p><strong>Firmware Dependencies:</strong></p><p>None</p><p><strong>Problems Fixed:</strong></p><p>Addressed an issue which prevented the installation of RHEL 9.7 and RHEL 10.1 when Secure Boot is enabled.</p><p><strong>Known Issues:</strong></p><p>None</p>","Lang":"en"},{"Enhancements":"","Fixes":"<p><strong>Important Notes:</strong></p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">Security Bulletin Library | HPE Support</a>.</p><p><strong>Firmware Dependencies:</strong></p><p>None</p><p><strong>Problems Fixed:</strong></p><p>Addressed an issue which prevented the installation of RHEL 9.7 and RHEL 10.1 when Secure Boot is enabled.</p><p><strong>Known Issues:</strong></p><p>None</p>","Lang":"ja"},{"Enhancements":"","Fixes":"<p><strong>Important Notes:</strong></p><p>Details about reported security vulnerabilities and their mitigation can be found at the following link <a href=\"https://support.hpe.com/connect/s/securitybulletinlibrary?language=en_US\">Security Bulletin Library | HPE Support</a>.</p><p><strong>Firmware Dependencies:</strong></p><p>None</p><p><strong>Problems Fixed:</strong></p><p>Addressed an issue which prevented the installation of RHEL 9.7 and RHEL 10.1 when Secure Boot is enabled.</p><p><strong>Known Issues:</strong></p><p>None</p>","Lang":"cn"}],"Version":"1.30_02-05-2026"}],"SWKeys":[{"Name":"R13","SWKeyExpectedPath":"firmware:system"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"},{"Family":"FTP","Model":"FTP-Only System"}],"UpgradeRequirements":"Recommended"},"PackageFormat":"FWPKG-v2","Type":"Firmware","UpdatableBy":["Bmc"],"VersionId":"f6393f8acadd4935b600f3aa0b979322"}]},{"ProductId":"857ac986dfec440b80025c47d900893b","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VV003840KXNTH","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM1743HPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3330-3834-304b584e5448","Version":"HPK6"},{"DeviceName":"VV007680KXNTN","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM1743HPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3730-3638-304b584e544e","Version":"HPK6"},{"DeviceName":"VV015360KXNTP","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"GPM1743HPK6.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3056-3531-3336-304b584e5450","Version":"HPK6"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: VV003840KXNTH, VV007680KXNTN and VV015360KXNTP"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive models: VV003840KXNTH, VV007680KXNTN and VV015360KXNTP"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VV003840KXNTH, VV007680KXNTN and VV015360KXNTP Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online&nbsp;NVMe SSD&nbsp;Flash Component for Linux (arm64) - VV003840KXNTH, VV007680KXNTN and VV015360KXNTP Drives<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK6</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"6098755","DateModified":"2025-10-13T02:30:19","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/.cpq_package.inc","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/.setup","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/CP062479.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/GPM1743HPK6.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/hpsetup","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-f20279bc06-HPK6-1.1/setup","./usr/lib/aarch64-linux-gnu/hp-scexe-compat","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP062479.scexe","./usr/lib/aarch64-linux-gnu/scexe-compat","./usr/lib/aarch64-linux-gnu/scexe-compat/CP062479.scexe"],"MD5Sum":"0b1e98c17265eb9f90104aa844f230af","Name":"firmware-hdd-f20279bc06-HPK6-1.1.aarch64.rpm","Release":"2025-10-13T06:21:09","Revision":"","SHA1Sum":"8672df101aeba4944e6ec02a961fb49788235f7f","SHA256Sum":"6d2f5795653c434295c480ef14ffaf8e9dd2267266f926e225f10333d945fcf9","Size":"5MB","TargetGUIDs":["562340a5-3056-3330-3834-304b584e5448","562340a5-3056-3730-3638-304b584e544e","562340a5-3056-3531-3336-304b584e5450"],"TypeOfChange":"1","Version":"HPK6"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On RPM-based Linux system:</strong></p><p><strong>Update&nbsp;firmware by installing the rpm:</strong></p><ul><li>Install the firmware rpm using the command:&nbsp;&nbsp;<em>rpm -ivh &lt;rpm_filename&gt;.rpm.&nbsp;</em>&nbsp;This extracts the contents of the rpm&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the rpm, run the command:&nbsp;<em>rpm -e &lt;rpm_package_name&gt;</em>, which is the rpm filename without the &#39;.rpm&#39; extension.</li></ul><p><strong>Updating firmware without installing the rpm:</strong></p><ul><li>Extract the contents of the rpm using the command:&nbsp;<em>rpm2cpio &lt;rpm_filename&gt;.rpm | cpio -id.&nbsp;</em>&nbsp;This extracts the contents of the rpm to &#39;usr&#39; folder in the current directory.</li><li>Navigate to the&nbsp;&#39;usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware rpm package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the rpm content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux (arm64) - VV003840KXNTH, VV007680KXNTN and VV015360KXNTP Drives"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux (arm64) - VV003840KXNTH, VV007680KXNTN and VV015360KXNTP Drives"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VV015360KXNTP","TargetGUID":"562340a5-3056-3531-3336-304b584e5450","Type":"nvme"},{"Id":"VV007680KXNTN","TargetGUID":"562340a5-3056-3730-3638-304b584e544e","Type":"nvme"},{"Id":"VV003840KXNTH","TargetGUID":"562340a5-3056-3330-3834-304b584e5448","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 for ARM","Platform":"red_hat_enterprise_linux_aarch64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server for ARM","Platform":"red_hat_enterprise_linux_ARM","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Red Hat Enterprise Linux 10 for ARM","Platform":"Red_Hat_Enterprise_Linux_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2024-08-30T11:05:50","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Firmware maintenance release.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Firmware maintenance release.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Firmware maintenance release.</li></ul>","Lang":"cn"}],"Version":"HPK6"}],"SWKeys":[{"Name":"VV003840KXNTH","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VV007680KXNTN","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VV015360KXNTP","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"c0432a513f4741bf8b523f7ef060537e"}]},{"ProductId":"bdc739b220714869adac43ec886dbaac","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VR000480KYXPQ","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KPE9010IHPK2.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3438-304b59585051","Version":"HPK2"},{"DeviceName":"VR000960KYXQA","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KPE9010IHPK2.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3936-304b59585141","Version":"HPK2"},{"DeviceName":"VR001920KYXQB","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"KPE9010IHPK2.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3130-3932-304b59585142","Version":"HPK2"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive model: VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online NVMe SSD Flash Component for Linux deb (arm64) - VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK2</p><p><br />&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; Online NVMe SSD Flash Component for Linux deb (arm64) - VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB Drive<br /><br /><strong>Release Version and/or Date:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp; HPK2</p><p><br />&nbsp;</p>"}],"Files":[{"Bytes":"14407748","DateModified":"2026-01-07T04:13:59","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/CP068509.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/KPE9010IHPK2.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-4b748c8174-HPK2-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068509.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068509.scexe"],"MD5Sum":"f8c2bb2847bb1be27892aaea4b4c96d6","Name":"firmware-hdd-4b748c8174-0HPK2-1.1_arm64.deb","Release":"2026-01-07T08:11:04","Revision":"","SHA1Sum":"6297afb5abbc97a7d7a0fc7e2f31b83ec00519b0","SHA256Sum":"eb616cfeb3b88f5fb6ddb289081f84258f26ba028d3027b84f44643e5f7a1f37","Size":"13MB","TargetGUIDs":["562340a5-3052-3030-3438-304b59585051","562340a5-3052-3030-3936-304b59585141","562340a5-3052-3130-3932-304b59585142"],"TypeOfChange":"1","Version":"HPK2"}],"Installation":{"Command":"CP041864.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB Drive"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - VR000480KYXPQ, VR000960KYXQA and VR001920KYXQB Drive"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VR000480KYXPQ","TargetGUID":"562340a5-3052-3030-3438-304b59585051","Type":"nvme"},{"Id":"VR000960KYXQA","TargetGUID":"562340a5-3052-3030-3936-304b59585141","Type":"nvme"},{"Id":"VR001920KYXQB","TargetGUID":"562340a5-3052-3130-3932-304b59585142","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-24T22:07:58","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>RSOD issue fixed. RSOD was occurred during server power-on if enable the VROC.</li></ul>","Lang":"cn"}],"Version":"HPK2"}],"SWKeys":[{"Name":"VR000480KYXPQ","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VR000960KYXQA","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"VR001920KYXQB","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"c34e03afe0fc45a997f1d59aeb19b61a"}]},{"ProductId":"8c02e06159ce40b292d3b2a200010701","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"MZXLR800HBHQ-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3830-3048c3876295","Version":"MPK7825Q"},{"DeviceName":"MZXLR1T6HBJR-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3154-3648ddfaa3a6","Version":"MPK7825Q"},{"DeviceName":"MZXLR3T2HBLS-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3354-3248a4bea716","Version":"MPK7825Q"},{"DeviceName":"MZXLR6T4HALA-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3654-3448e7bd3d2a","Version":"MPK7825Q"},{"DeviceName":"MZXLR12THALA-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3132-544869b8df72","Version":"MPK7825Q"},{"DeviceName":"MZXLR960HBHQ-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3936-3048d2d64915","Version":"MPK7825Q"},{"DeviceName":"MZXLR1T9HBJR-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3154-3948cda93afa","Version":"MPK7825Q"},{"DeviceName":"MZXLR3T8HBLS-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3354-3848df400867","Version":"MPK7825Q"},{"DeviceName":"MZXLR7T6HALA-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3754-36484bc80db1","Version":"MPK7825Q"},{"DeviceName":"MZXLR15THALA-000H3","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"MPK7825Q.bin","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"4d2340a5-585a-524c-3135-5448e88a517e","Version":"MPK7825Q"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3"},{"Lang":"cn","Value":"This arm64 Smart Component provides firmware for the following drive models: MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3"},{"Lang":"ja","Value":"This arm64 Smart Component provides firmware for the following drive models: MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Online NVMe SSD Flash Component ffor Linux deb (arm64) -&nbsp;MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3&nbsp; Drives&nbsp;<br /><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>MPK7825Q</p><p><strong>Last Recommended or Critical Version:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Previous Version of Firmware:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Firmware Dependency:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>None</p><p><strong>Enhancements/New Features :</strong></p><p>&nbsp; &nbsp; &nbsp; None</p><p><strong>Problem Fixed:</strong></p><ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul><p><strong>Known Issues:</strong></p><p><strong>&nbsp; &nbsp;&nbsp; </strong>None</p>"},{"Lang":"cn","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Online NVMe SSD Flash Component ffor Linux deb (arm64) -&nbsp;MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3&nbsp; Drives&nbsp;<br /><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>MPK7825Q</p><p><strong>Last Recommended or Critical Version:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Previous Version of Firmware:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Firmware Dependency:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>None</p><p><strong>Enhancements/New Features :</strong></p><p>&nbsp; &nbsp; &nbsp; None</p><p><strong>Problem Fixed:</strong></p><ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul><p><strong>Known Issues:</strong></p><p><strong>&nbsp; &nbsp;&nbsp; </strong>None</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:</strong><br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Online NVMe SSD Flash Component ffor Linux deb (arm64) -&nbsp;MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3, MZXLR7T6HALA-000H3 and MZXLR15THALA-000H3&nbsp; Drives&nbsp;<br /><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>MPK7825Q</p><p><strong>Last Recommended or Critical Version:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Previous Version of Firmware:</strong><br />&nbsp; &nbsp; &nbsp; None</p><p><strong>Firmware Dependency:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>None</p><p><strong>Enhancements/New Features :</strong></p><p>&nbsp; &nbsp; &nbsp; None</p><p><strong>Problem Fixed:</strong></p><ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul><p><strong>Known Issues:</strong></p><p><strong>&nbsp; &nbsp;&nbsp; </strong>None</p>"}],"Files":[{"Bytes":"13520552","DateModified":"2025-12-03T04:34:48","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/CP069901.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/MPK7825Q.bin","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-951aefd63e-MPK7825Q-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP069901.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP069901.scexe"],"MD5Sum":"09a855075524e4a8fa56b26b9741b7c0","Name":"firmware-hdd-951aefd63e-0MPK7825Q-1.1_arm64.deb","Release":"2025-12-03T08:31:44","Revision":"","SHA1Sum":"c05fee2bc4f08fcd010156be9e5e9f713968c662","SHA256Sum":"a7cee6689763fc7f30270c6b3db9a0cab4c8f2d18b2e13e2261c88ebae5e5a5d","Size":"12MB","TargetGUIDs":["4d2340a5-585a-524c-3830-3048c3876295","4d2340a5-585a-524c-3154-3648ddfaa3a6","4d2340a5-585a-524c-3354-3248a4bea716","4d2340a5-585a-524c-3654-3448e7bd3d2a","4d2340a5-585a-524c-3132-544869b8df72","4d2340a5-585a-524c-3936-3048d2d64915","4d2340a5-585a-524c-3154-3948cda93afa","4d2340a5-585a-524c-3354-3848df400867","4d2340a5-585a-524c-3754-36484bc80db1","4d2340a5-585a-524c-3135-5448e88a517e"],"TypeOfChange":"1","Version":"MPK7825Q"}],"Installation":{"Command":"CP043037.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp;&nbsp;<em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command:&nbsp;<em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command:&nbsp;<em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to&nbsp;<em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"cn","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp;&nbsp;<em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command:&nbsp;<em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command:&nbsp;<em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to&nbsp;<em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp;&nbsp;<em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command:&nbsp;<em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command:&nbsp;<em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to&nbsp;<em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3 and MZXLR7T6HALA-000H3 Drive"},{"Lang":"cn","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3 and MZXLR7T6HALA-000H3 Drive"},{"Lang":"ja","Value":"Online NVMe SSD Flash Component for Linux deb (arm64) - MZXLR800HBHQ-000H3, MZXLR1T6HBJR-000H3, MZXLR3T2HBLS-000H3, MZXLR6T4HALA-000H3, MZXLR12THALA-000H3, MZXLR960HBHQ-000H3, MZXLR1T9HBJR-000H3, MZXLR3T8HBLS-000H3 and MZXLR7T6HALA-000H3 Drive"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"6000"},"SupportedDevices":[{"Id":"MZXLR12THALA-000H3","TargetGUID":"4d2340a5-585a-524c-3132-544869b8df72","Type":"nvme"},{"Id":"MZXLR15THALA-000H3","TargetGUID":"4d2340a5-585a-524c-3135-5448e88a517e","Type":"nvme"},{"Id":"MZXLR7T6HALA-000H3","TargetGUID":"4d2340a5-585a-524c-3754-36484bc80db1","Type":"nvme"},{"Id":"MZXLR1T6HBJR-000H3","TargetGUID":"4d2340a5-585a-524c-3154-3648ddfaa3a6","Type":"nvme"},{"Id":"MZXLR800HBHQ-000H3","TargetGUID":"4d2340a5-585a-524c-3830-3048c3876295","Type":"nvme"},{"Id":"MZXLR3T2HBLS-000H3","TargetGUID":"4d2340a5-585a-524c-3354-3248a4bea716","Type":"nvme"},{"Id":"MZXLR6T4HALA-000H3","TargetGUID":"4d2340a5-585a-524c-3654-3448e7bd3d2a","Type":"nvme"},{"Id":"MZXLR1T9HBJR-000H3","TargetGUID":"4d2340a5-585a-524c-3154-3948cda93afa","Type":"nvme"},{"Id":"MZXLR3T8HBLS-000H3","TargetGUID":"4d2340a5-585a-524c-3354-3848df400867","Type":"nvme"},{"Id":"MZXLR960HBHQ-000H3","TargetGUID":"4d2340a5-585a-524c-3936-3048d2d64915","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"},{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-12-27T13:14:07","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Fix for Uncorrectable Machine Check Exception (UMCE) issue which might occur.</li></ul>","Lang":"cn"}],"Version":"MPK7825Q"}],"SWKeys":[{"Name":"MZXLR800HBHQ-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR1T6HBJR-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR3T2HBLS-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR6T4HALA-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR12THALA-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR960HBHQ-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR1T9HBJR-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR3T8HBLS-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR7T6HALA-000H3","SWKeyExpectedPath":"firmware:sd:NVME"},{"Name":"MZXLR15THALA-000H3","SWKeyExpectedPath":"firmware:sd:NVME"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"c2bc3e7d224847efb5ea881a320de8ea"}]},{"ProductId":"2b379144fd3f4e8f9ae738e221692d85","Versions":[{"DeviceClass":"F6DE0320-2E0F-489A-B238-6DD8AE7C3811","Devices":{"Device":[{"DeviceName":"VR000480KXNXE","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"M7450ALLHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3438-304b584e5845","Version":"HPK4"},{"DeviceName":"VR000960KXNZU","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"M7450ALLHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3052-3030-3936-304b584e5a55","Version":"HPK4"},{"DeviceName":"VS001920KXNXF","FirmwareImages":[{"DelayAfterInstallSec":10,"DirectFlashOK":false,"FileName":"M7450ALLHPK4.rel","InstallDurationSec":300,"Order":1,"ResetRequired":false,"Type":"Firmware","UEFIFlashable":false}],"Target":"562340a5-3053-3130-3932-304b584e5846","Version":"HPK4"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"ja","Value":"Firmware - PCIe NVMe Storage Disk"},{"Lang":"cn","Value":"固件 - PCIe NVMe存储磁盘"}],"Description":[{"Lang":"en","Value":"This arm64 Smart Component provides firmware for the following drive models: VR000480KXNXE,VR000960KXNZU and VS001920KXNXF"},{"Lang":"ja","Value":"このarm64 Smartコンポーネントパッケージは、次のドライブモデルのファームウェアを提供します：VR000480KXNXE、VR000960KXNZU、およびVS001920KXNXF"}],"Divisions":[{"Division":[{"Lang":"en","Value":"Storage"},{"Lang":"ja","Value":"ストレージ"},{"Lang":"cn","Value":"存储设备"}]}],"Documentation":[{"Lang":"en","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online HDD/SSD Flash Component for Linux deb (arm64) - VR000480KXNXE,VR000960KXNZU and VS001920KXNXF Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK4</p><p>&nbsp;</p>"},{"Lang":"ja","Value":"<p><strong>Deliverable Name:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>Online HDD/SSD Flash Component for Linux deb (arm64) - VR000480KXNXE,VR000960KXNZU and VS001920KXNXF Drives</p><p><strong>Release Version and/or Date:<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</strong>HPK4</p><p>&nbsp;</p>"}],"Files":[{"Bytes":"8009312","DateModified":"2025-08-24T21:55:24","FileList":["./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/CP068507.xml","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/M7450ALLHPK4.rel","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/libsetup.so","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/payload.json","./usr/lib/aarch64-linux-gnu/firmware-hdd-2ba844ae8c-HPK4-1.1/setup","./usr/lib/aarch64-linux-gnu/scexe-compat/CP068507.scexe","./usr/lib/aarch64-linux-gnu/hp-scexe-compat/CP068507.scexe"],"MD5Sum":"fe3c6a8570059c6289d2dc18f71e7fa1","Name":"firmware-hdd-2ba844ae8c-0HPK4-1.1_arm64.deb","Release":"2025-08-25T01:52:04","Revision":"","SHA1Sum":"d0f96db770cb6d44390676c63370ff0d7ec52299","SHA256Sum":"427e9209b066a06e9a3c88c72530ec787d8554b4caa375a246e38d109c95863a","Size":"7MB","TargetGUIDs":["562340a5-3052-3030-3438-304b584e5845","562340a5-3052-3030-3936-304b584e5a55","562340a5-3053-3130-3932-304b584e5846"],"TypeOfChange":"1","Version":"HPK4"}],"Installation":{"Command":"CP043255.scexe","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":120,"RebootDetails":[{"Lang":"en","Value":"Reboot may be required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後再起動が必要になることがあります。"},{"Lang":"cn","Value":"安装之后必须重启才能使更新生效并保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"Environment Dependent"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032c","SWKey":"032C1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus servers firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032b","SWKey":"032B1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-a Gen10 Plus Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e21590032a","SWKey":"032A1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen10 Plus Tri Mode Controller with Gen10 and Gen10 Plus server firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900293","SWKey":"02931590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900383","SWKey":"03831590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900382","SWKey":"03821590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0651","SWKey":"0651103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0650","SWKey":"0650103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0652","SWKey":"0652103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0654","SWKey":"0654103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0700","SWKey":"0700103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0600","SWKey":"0600103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0603","SWKey":"0603103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0602","SWKey":"0602103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c0601","SWKey":"0601103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1101","SWKey":"1101103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Smart Array P408i-p, P408e-p, P408i-a, P408i-c, E208i-p, E208e-p, E208i-c, E208i-a, P408e-m, P204i-c, P416ie-m and P816i-a SR Gen10 and Gen11 controllers firmware version 6.22 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f103c1100","SWKey":"1100103C","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"6.22"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900329","SWKey":"03291590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR408i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e2159003c8","SWKey":"03C81590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-o Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900328","SWKey":"03281590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR216i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900326","SWKey":"03261590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002db","SWKey":"02DB1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f1590032e","SWKey":"032E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900381","SWKey":"03811590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900294","SWKey":"02941590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE SR932i-p Gen10 Plus /SR416i-a Gen10 Plus/SR932i-p Gen11/SR416ie-m Gen11 Controllers firmware version 03.01.23.072 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002dc","SWKey":"02DC1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.23.072"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900379","SWKey":"03791590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900380","SWKey":"03801590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-2241159002f6","SWKey":"02F61590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030e","SWKey":"030E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-22411590030f","SWKey":"030F1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 Boot Controller NS204i-u, NS204i-d and HPE Gen10 Plus Boot Controller NS204i-p, NS204i-d, NS204i-t, NS204i-r firmware version 1.2.14.1009 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1b4b-224115900310","SWKey":"03101590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"1.2.14.1009"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE MR416i-p Gen11 Tri Mode Controller firmware version 52.24.3-4948 or greater is required and should be already active for fwpkg driver update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-1000-10e215900325","SWKey":"03251590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"52.24.3-4948"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"},{"Lang":"ja","Value":"<p><strong>On DEB-based Linux system:</strong></p><p><strong>Updating firmware by installing the deb:</strong></p><ul><li>Install the firmware deb&nbsp;using the command:&nbsp; <em>dpkg&nbsp;-i&nbsp;&lt;deb_filename&gt;.deb.&nbsp;</em>&nbsp;This extracts the contents of the deb&nbsp;to the &#39;/usr/lib/aarch64-linux-gnu&#39; location.</li><li>The CP&lt;nnnnnn&gt;.scexe script is located in the &#39;scexe-compat&#39; folder.&nbsp;&nbsp;</li><li>To install firmware, run ./CP&lt;nnnnnn&gt;.scexe in the &#39;/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li><li>To uninstall the deb, run the command: <em>dpkg&nbsp;--purge&nbsp;&lt;deb_package_name&gt;</em>, which is the deb&nbsp;filename without the &#39;.deb&#39; extension.</li></ul><p><strong>Updating firmware without installing the deb:</strong></p><ul><li>Extract the contents of the deb&nbsp;using the command: <em>dpkg-deb&nbsp;-R &lt;deb_filename&gt;.deb&nbsp;&lt;target_folder&gt;.</em>This extracts the contents of the deb&nbsp;to <em>&lt;target_folder&gt;</em>&nbsp;folder.</li><li>Navigate to the&nbsp;&#39;<em>&lt;target_folder&gt;</em>/usr/lib/aarch64-linux-gnu/scexe-compat&#39; location and run&nbsp;./CP&lt;nnnnnn&gt;.scexe&nbsp;to update the firmware.</li><li>The results of the firmware upgrade are saved to the Component.log file, located in the /var/cpq/ directory.</li></ul><p><strong>Additional Information:</strong></p><p>Installing the firmware deb package&nbsp;does not update the firmware.&nbsp;&nbsp;It merely extracts the deb content to the local system. Updating the firmware on the local system requires following the&nbsp;above outlined steps.</p>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Online HDD/SSD Flash Component for Linux deb (arm64) - VR000480KXNXE,VR000960KXNZU and VS001920KXNXF Drives"},{"Lang":"ja","Value":"オンラインHDD/SSDフラッシュコンポーネントfor Linux deb (arm64) - VR000480KXNXE、VR000960KXNZUおよびVS001920KXNXFドライブ"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"4000"},"SupportedDevices":[{"Id":"VS001920KXNXF","TargetGUID":"562340a5-3053-3130-3932-304b584e5846","Type":"nvme"},{"Id":"VR000480KXNXE","TargetGUID":"562340a5-3052-3030-3438-304b584e5845","Type":"nvme"},{"Id":"VR000960KXNZU","TargetGUID":"562340a5-3052-3030-3936-304b584e5a55","Type":"nvme"}],"SupportedOperatingSystems":[{"Major":"22","Minor":"04","Name":"Ubuntu 22.04 LTS","Platform":"ubuntu2204","Sr":"OEM"},{"Major":"24","Minor":"04","Name":"Ubuntu 24.04 LTS","Platform":"ubuntu2404","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-09-24T21:57:27","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"","Fixes":"<ul><li>Changes and improvements&nbsp;which disable MCTP over PCIe VDM over the previous firmware.</li></ul>","Lang":"en"},{"Enhancements":"","Fixes":"<ul><li>Changes and improvements&nbsp;which disable MCTP over PCIe VDM over the previous firmware.</li></ul>","Lang":"ja"},{"Enhancements":"","Fixes":"<ul><li>Changes and improvements&nbsp;which disable MCTP over PCIe VDM over the previous firmware.</li></ul>","Lang":"cn"}],"Version":"HPK4"}],"SWKeys":[{"Name":"VR000480KXNXE","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VR000960KXNZU","SWKeyExpectedPath":"firmware:sd:nvme"},{"Name":"VS001920KXNXF","SWKeyExpectedPath":"firmware:sd:nvme"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[],"UpgradeRequirements":"Recommended"},"Type":"Firmware","UpdatableBy":["RuntimeAgent"],"VersionId":"f77c443adebe46e9b693fab548cd528f"}]},{"ProductId":"f2ad814ee9344547a02f34046e80f6f4","Versions":[{"DeviceClass":"e7a8b7dd-a6c0-4056-b14a-97bc423ddc7b","Devices":{"Device":[]},"Package":{"Category":[{"Lang":"en","Value":"Software - System Management"},{"Lang":"ja","Value":"ソフトウェア - システム マネジメント"},{"Lang":"cn","Value":"软件 - 系统管理"}],"Description":[{"Lang":"en","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."},{"Lang":"ja","Value":"Agentless Management Service（AMSD）は、Integrated Lights Out 6（iLO 6）内蔵ヘルスおよびアラートのサポートを提供します。"},{"Lang":"cn","Value":"Agentless Management Service (AMSD) provides support for Integrated Lights-Out 6 (iLO 6) Embedded Health and Alerting."}],"Divisions":[{"Division":[{"Lang":"en","Value":"Lights Out"},{"Lang":"ja","Value":"Lights Out"},{"Lang":"cn","Value":"Lights Out"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"8566842","DateModified":"2026-02-18T03:50:00","FileList":["./etc/sysconfig/ahslog","./etc/sysconfig/amsd","./etc/sysconfig/amsd_rev","./etc/sysconfig/cpqFca","./etc/sysconfig/cpqFca_rev","./etc/sysconfig/cpqIde","./etc/sysconfig/cpqIde_rev","./etc/sysconfig/cpqiScsi","./etc/sysconfig/smad","./etc/sysconfig/smad_rev","./opt/amsd","./opt/amsd/amsd.license","./sbin/ahslog","./sbin/amscli","./sbin/cpqiScsi","./usr/lib/.build-id","./usr/lib/.build-id/01","./usr/lib/.build-id/01/97a31ced82c2e51291eb349e47e51f20d65649","./usr/lib/.build-id/01/97a31ced82c2e51291eb349e47e51f20d65649.1","./usr/lib/.build-id/16","./usr/lib/.build-id/16/3d177c0f06789f9ee36a6207d18523c91e7ede","./usr/lib/.build-id/16/3d177c0f06789f9ee36a6207d18523c91e7ede.1","./usr/lib/.build-id/55","./usr/lib/.build-id/55/677d5e9465786531a7133307d08bd13a402898","./usr/lib/.build-id/c0","./usr/lib/.build-id/c0/74219b5b8670b08eed0a5306b1d05193ac778e","./usr/lib/.build-id/dc","./usr/lib/.build-id/dc/dfd444f7986c7ec285af19d30f983a35519fd6","./usr/lib/.build-id/dc/dfd444f7986c7ec285af19d30f983a35519fd6.1","./usr/lib/.build-id/e2","./usr/lib/.build-id/e2/be89a57d8d9d1fc75848899e764f948982319f","./usr/lib/.build-id/e5","./usr/lib/.build-id/e5/8da478b252083235c6ac402ba6a92e7b415488","./usr/lib/.build-id/e5/8da478b252083235c6ac402ba6a92e7b415488.1","./usr/lib/systemd/system/ahslog.service","./usr/lib/systemd/system/amsd.service","./usr/lib/systemd/system/amsd_rev.service","./usr/lib/systemd/system/cpqFca.service","./usr/lib/systemd/system/cpqFca_rev.service","./usr/lib/systemd/system/cpqIde.service","./usr/lib/systemd/system/cpqIde_rev.service","./usr/lib/systemd/system/cpqiScsi.service","./usr/lib/systemd/system/smad.service","./usr/lib/systemd/system/smad_rev.service","./usr/lib/udev/rules.d/81-cpqFca.rules","./usr/lib/udev/rules.d/81-cpqiScsi.rules","./usr/share/man/man8/ahslog.8.gz","./usr/share/man/man8/amsd.8.gz","./usr/share/man/man8/cpqFca.8.gz","./usr/share/man/man8/cpqIde.8.gz","./usr/share/man/man8/cpqiScsi.8.gz","./usr/share/man/man8/smad.8.gz","./usr/share/smartupdate/amsd/component.xml","./sbin/amsd","./sbin/amsd_rev","./sbin/cpqFca","./sbin/cpqFca_rev","./sbin/cpqIde","./sbin/cpqIde_rev","./sbin/smad","./sbin/smad_rev"],"MD5Sum":"3c8eaddc60b88cf651154600640a49b3","Name":"amsd-4.5.0-2120.2.sles15.aarch64.rpm","Release":"2026-02-18T07:43:35","Revision":"","SHA1Sum":"cc6d041349e32c56a17463cac6e95eb4804290da","SHA256Sum":"55a21abec56d38193ccd2fa7430690511fbdb6636b1547a1a990a9fa6f99d98c","Size":"8MB","TargetGUIDs":["20a6e8e4-bf33-4c71-a6bf-d9ecb37bf5ae"],"TypeOfChange":"1","Version":"4.5.0"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{},"PerDeviceInstallTimeSeconds":0,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{},"InstallationNotes":[{"Lang":"en","Value":"<p>Login as the system administrator (root), download the RPM to a directory on your hard drive and change to that directory.</p><ul><li>To install the package type:<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-&lt;version&gt;.rpm</li></ul></li><li>To check whether the package is loaded properly type:<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>Additional help is available by typing:<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"},{"Lang":"ja","Value":"<p>システム管理者（root）としてログインし、RPMをハードディスク上のディレクトリにダウンロードした後、そのディレクトリに移動します。</p><ul><li>パッケージをインストールするには、次のようにタイプします。<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-<version>.rpm</li></ul></li><li>パッケージが正しくロードされているか、以下をタイプして確認します。<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>以下のコマンドを実行してヘルプを参照してください。<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"},{"Lang":"cn","Value":"<p>Login as the system administrator (root), download the RPM to a directory on your hard drive and change to that directory.</p><ul><li>To install the package type:<ul style=\"list-style-type:circle\"><li>rpm -Uvh amsd-&lt;version&gt;.rpm</li></ul></li><li>To check whether the package is loaded properly type:<ul style=\"list-style-type:circle\"><li>systemctl status amsd</li><li>systemctl status smad</li></ul></li><li>Additional help is available by typing:<ul style=\"list-style-type:circle\"><li>man amsd</li></ul></li></ul>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Agentless Management Service (iLO 6) for SUSE Linux Enterprise Server 15 for ARM-based Systems"},{"Lang":"ja","Value":"ARMベースのシステム用のAgentless Management Service (iLO 6) for SUSE Linux Enterprise Server 15"},{"Lang":"cn","Value":"Agentless Management Service (iLO 6) for SUSE Linux Enterprise Server 15 for ARM-based Systems"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"0"},"SupportedDevices":[{"Id":"2f317b9d-c9e3-4d76-bff6-b9d0d085a952","TargetGUID":"","Type":"other"},{"Id":"2f317b9d-c9e3-4d76-bff6-b9d0d085a952","TargetGUID":"","Type":"other"},{"Dev":"3307","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3307159000e4","Type":"pci","Ven":"103c"},{"Dev":"3306","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3306159000e4","Type":"pci","Ven":"103c"},{"Dev":"3306","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3306159000e4","Type":"pci","Ven":"103C"},{"Dev":"3307","SubDev":"00E4","SubVen":"1590","TargetGUID":"a6b1a447-382a-5a4f-103c-3307159000e4","Type":"pci","Ven":"103C"}],"SupportedOperatingSystems":[{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15 for ARM","Platform":"suse_linux_enterprise_server_aarch64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2026-03-05T07:34:00","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"en"},{"Enhancements":"<p>HPE ProLiant Compute DL384 Gen12サーバーのAMS認定</p>","Fixes":"<p>非NVMeローカルドライブのホットアド/リムーブ時にamsdがクラッシュする問題を修正。</p>","Lang":"ja"},{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"cn"}],"Version":"3.5.0"},{"ReleaseNotes":[{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"en"},{"Enhancements":"<p>HPE ProLiant Compute DL384 Gen12サーバーのAMS認定</p>","Fixes":"<p>非NVMeローカルドライブのホットアド/リムーブ時にamsdがクラッシュする問題を修正。</p>","Lang":"ja"},{"Enhancements":"<p>AMS qualification of HPE ProLiant Compute DL384 Gen12 Server</p>","Fixes":"<p>Fix for amsd crashing upon hot-add/remove of non-nvme local drives.</p>","Lang":"cn"}],"Version":"4.5.0"}],"SWKeys":[{"Name":"amsd","SWKeyExpectedPath":"software:rpm"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"R11","Model":"HPE ProLiant RL300 Gen11"},{"Family":"R13","Model":"HPE ProLiant Compute DL384 Gen12"}],"UpgradeRequirements":"Recommended"},"Type":"Software","UpdatableBy":["RuntimeAgent"],"VersionId":"6082847bdfe944b1ab2478158945818a"}]},{"ProductId":"6ca442c991c749709fbf69d8d57a3358","Versions":[{"DeviceClass":"4149ebb7-d64b-4654-b679-4280f349ea50","Devices":{"Device":[{"DeviceName":"UBM5 Backplane PIC","FirmwareImages":[{"DelayAfterInstallSec":0,"DirectFlashOK":true,"FileName":"HPE_UBM5_1.16_A.HPb","InstallDurationSec":1200,"Order":1,"PLDMImage":true,"ResetRequired":false,"ServerPowerOff":false,"SysPowerOn":true,"Type":"Firmware","UEFIFlashable":true}],"Target":"9675b54e-1c96-44c3-a7a1-901505000000","Version":"1.16"}]},"Package":{"Category":[{"Lang":"en","Value":"Firmware - System"},{"Lang":"ja","Value":"ファームウェア - システム"},{"Lang":"cn","Value":"固件 - 系统 ROM"}],"Description":[{"Lang":"en","Value":"This firmware package contains firmware for ProLiant Gen11 UBM5 storage backplanes."},{"Lang":"ja","Value":"このファームウェアパッケージには、ProLiant Gen11 UBM5ストレージバックプレーンのファームウェアが含まれています。"},{"Lang":"cn","Value":"This firmware package contains firmware for ProLiant Gen11 UBM5 storage backplanes."}],"Divisions":[{"Division":[{"Lang":"en","Value":"ServerOptions"},{"Lang":"ja","Value":"サーバ オプション"},{"Lang":"cn","Value":"服务器选项"}]},{"Division":[{"Lang":"en","Value":"Server"},{"Lang":"ja","Value":"サーバ"},{"Lang":"cn","Value":"服务器"}]}],"Documentation":[],"Files":[{"Bytes":"457058","DateModified":"2024-11-21T05:33:13","FileList":["HPE_UBM5_1.16_A.HPb","HPE_UBM5_1.16_A.xml","payload.json"],"MD5Sum":"6535a4d35f543390ba088a1a5dab2c57","Name":"HPE_UBM5_1.16_A.fwpkg","Release":"2025-03-05T00:00:00","Revision":"","SHA1Sum":"55e1b63b4d55298a013c50bb3aa45dbe61253819","SHA256Sum":"3468419f0d5fe24ec9d94d4bcfd91101a2a53dc8b3ccecef725839380e7291d3","Size":"446KB","TargetGUIDs":["9675b54e-1c96-44c3-a7a1-901505000000"],"TypeOfChange":"1","Version":"1.16"}],"Installation":{"Command":"","CommandParams":"","InstallCaps":{"NeedUserAction":"no","Silent":"yes"},"PerDeviceInstallTimeSeconds":1200,"RebootDetails":[{"Lang":"en","Value":"Reboot is not required after installation for updates to take effect and hardware stability to be maintained."},{"Lang":"ja","Value":"アップデートの効果とハードウェアの安定を得るために、インストール後の再起動は必要ありません。"},{"Lang":"cn","Value":"安装之后无需重启即可使更新生效并可保持硬件稳定性。"}],"RebootRequired":"no","RebootRequirement":"No"},"InstallationDependency":{"DependencyRequirement":[{"ListConditional":"AND","SubRequirements":[{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f159002db","SWKey":"02DB1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f15900381","SWKey":"03811590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]},{"ListConditional":"OR","Requirement":[{"Condition":"AlreadyActive","Description":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","DeviceGUID":"79F0C163-0C13-4662-9DEA-09235FEF90CB","Message":"HPE Gen11 SR416i-o/SR932i-p controller firmware version 03.01.14.062 or greater is required and should be already active for firmware update. Update the firmware and reboot before attempting firmware update.","OSVersion":{},"RequirementGUID":"a6b1a447-382a-5a4f-9005-028f1590032e","SWKey":"032E1590","ServerModel":["*"],"TargetGUIDs":[],"Type":"GTE","Version":"03.01.14.062"}]}]}]},"InstallationNotes":[{"Lang":"en","Value":"<p>Flash the PLDM firmware using any below methods</p><ol><li>Flash using iLOrest tool&nbsp;</li><li>Flash using&nbsp;Smart Update Manager (SUM).</li><li>Flash from iLO GUI</li></ol><p>1. To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>&nbsp; &nbsp; localhost OS example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p><p>&nbsp; &nbsp; remote example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO_IP_Address&gt; -u &lt;iLO_username&gt; -p &lt;iLO_password&gt;</em></strong></p><p>2. This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p><p><strong>&nbsp; &nbsp; Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p><ul><li><p>Place the Service Pack for ProLiant on a USB key using the&nbsp;USB Key Creator Utility.</p></li><li><p>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\\packages&quot; on the USB key.</p></li></ul><p>&nbsp; &nbsp; &nbsp;Update the firmware and software&nbsp;in the usual manner.</p><p>3.&nbsp;Flash from iLO GUI</p><ul><li>Browse iLO IP using any browser and login using the credential&nbsp;</li><li>Make sure the PLDM supported adapter is present in the server</li><li>Go to iLO GUI -&gt; Click on &quot;Firmware and OS software&quot; from left side&nbsp;&nbsp;-&gt; Click on &quot;Update Firmware&quot; -&gt; Click on &quot;Choose File&quot; and browse to the supported PLDM file -&gt; Then click on &quot;Flash&quot; button.&nbsp;</li><li>Update status will be show in the Top and a log entry can be seen in Integrated Managenment Log (IML)&nbsp;</li></ul>"},{"Lang":"ja","Value":"<p>以下のいずれかの方法を使用してPLDMファームウェアをフラッシュします</p><ol><li>iLOrestツールを使用したフラッシュ </li><li>Smart Update Manager（SUM）を使用したフラッシュ</li><li>iLO GUIからのフラッシュ</li></ol><p>1. このファームウェアパッケージをフラッシュするには、次のiLOrestコマンドを使用します。 iLOrestツールの最新バージョンをダウンロードするには、<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>を参照してください。</p><p>    ローカルホストOSの例：<br /><strong><em>    ilorest flashfwpkg <file_name.fwpkg> </em></strong></p><p>    リモートの例：<br /><strong><em>ilorest flashfwpkg <file_name.fwpkg> --url <iLO_IP_Address> -u <iLO_username> -p <iLO_password></em></strong></p><p>2. このファームウェアパッケージは、Smart Update Manager（SUM）の最新バージョンでもインストールできます。</p><p>サポートされるProLiantサーバーおよびオプションのための<strong>サプリメンタルアップデート</strong>は、<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong> (SPP) ISO上にあるSUMを使用して実行できます。</p><ul><li><p>USB Key Creator Utilityを使用して、Service Pack for ProLiantをUSBキーにコピーします。</p></li><li><p>アップデートに必要なファームウェアパッケージおよびコンポーネントをUSBキーの\"\\packages\"ディレクトリにコピーします。</p></li></ul><p>     通常の手順でファームウェアおよびソフトウェアをアップデートします。</p><p>3. iLO GUIからのフラッシュ</p><ul><li>任意のブラウザーを使用してiLO IPを参照し、資格情報を使用してログインします </li><li>PLDMでサポートされているアダプターがサーバーに存在していることを確認します</li><li>iLO GUIに移動します -> 左側から[ファームウェア & OSソフトウェア]をクリックします -> [ファームウェアのアップデート]をクリックします -> [ファイルを選択]をクリックして、サポートされているPLDMファイルを参照します -> [フラッシュ]ボタンをクリックします。 </li><li>アップデートステータスが上部に表示され、インテグレーテッドマネジメントログ（IML）にログエントリーが記録されます。 </li></ul>"},{"Lang":"cn","Value":"<p>Flash the PLDM firmware using any below methods</p><ol><li>Flash using iLOrest tool&nbsp;</li><li>Flash using&nbsp;Smart Update Manager (SUM).</li><li>Flash from iLO GUI</li></ol><p>1. To flash this firmware package, use the following iLOrest command. &nbsp;See&nbsp;<a href=\"http://www.hpe.com/servers/resttool\">http://www.hpe.com/servers/resttool</a>&nbsp;to download the latest version of the iLOrest tool.</p><p>&nbsp; &nbsp; localhost OS example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt;&nbsp;</em></strong></p><p>&nbsp; &nbsp; remote example:<br /><strong><em>&nbsp; &nbsp; ilorest flashfwpkg &lt;file_name.fwpkg&gt; --url &lt;iLO_IP_Address&gt; -u &lt;iLO_username&gt; -p &lt;iLO_password&gt;</em></strong></p><p>2. This firmware package can also be installed with the latest version of Smart Update Manager (SUM).</p><p><strong>&nbsp; &nbsp; Supplemental updates</strong>&nbsp;for supported ProLiant servers and options can be done by using&nbsp;SUM, which is found on the&nbsp;<strong><a href=\"http://www.hpe.com/info/spp\">Service Pack for ProLiant</a></strong>&nbsp;(SPP) ISO.</p><ul><li><p>Place the Service Pack for ProLiant on a USB key using the&nbsp;USB Key Creator Utility.</p></li><li><p>Place the desired&nbsp;firmware packages and components&nbsp;to be updated in the directory&nbsp;&quot;\\packages&quot; on the USB key.</p></li></ul><p>&nbsp; &nbsp; &nbsp;Update the firmware and software&nbsp;in the usual manner.</p><p>3.&nbsp;Flash from iLO GUI</p><ul><li>Browse iLO IP using any browser and login using the credential&nbsp;</li><li>Make sure the PLDM supported adapter is present in the server</li><li>Go to iLO GUI -&gt; Click on &quot;Firmware and OS software&quot; from left side&nbsp;&nbsp;-&gt; Click on &quot;Update Firmware&quot; -&gt; Click on &quot;Choose File&quot; and browse to the supported PLDM file -&gt; Then click on &quot;Flash&quot; button.&nbsp;</li><li>Update status will be show in the Top and a log entry can be seen in Integrated Managenment Log (IML)&nbsp;</li></ul>"}],"ManufacturerName":[{"Lang":"en","Value":"Hewlett Packard Enterprise"},{"Lang":"ja","Value":"Hewlett Packard Enterprise"},{"Lang":"cn","Value":"惠普企业"}],"Name":[{"Lang":"en","Value":"Firmware Package - UBM5 Backplane PIC PLDM Firmware for Gen11 servers usage"},{"Lang":"ja","Value":"ファームウェアパッケージ - UBM5バックプレーンPIC PLDMファームウェアfor Gen11サーバー"},{"Lang":"cn","Value":"Firmware Package - UBM5 Backplane PIC PLDM Firmware for Gen11 servers usage"}],"Prerequisites":{"RequiredDiskSpace":{"SizeKB":"11000"},"SupportedDevices":[{"Id":"9675b54e-1c96-44c3-a7a1-901505000000","TargetGUID":"","Type":"nvmeubmpicnew"}],"SupportedOperatingSystems":[{"Major":"0","Minor":"0","Name":"Cross Operating System","Platform":"oi","Sr":"OEM"},{"Major":"7","Minor":"0","Name":"VMware ESXi 7.0","Platform":"vmware_esx_server","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Microsoft Windows Server 2019","Platform":"nt_x86-64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"Red Hat Enterprise Linux 8 Server","Platform":"red_hat_enterprise_linux_x86_64","Sr":"OEM"},{"Major":"15","Minor":"0","Name":"SUSE Linux Enterprise Server 15","Platform":"suse_linux_enterprise_server_x86_64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Microsoft Windows Server 2022","Platform":"nt_x86-64","Sr":"OEM"},{"Major":"8","Minor":"0","Name":"VMware ESXi 8.0","Platform":"vmware_esx_server","Sr":"OEM"},{"Major":"9","Minor":"0","Name":"Red Hat Enterprise Linux 9 Server","Platform":"red_hat_enterprise_linux_x86_64","Sr":"OEM"},{"Major":"10","Minor":"0","Name":"Microsoft Windows Server 2025","Platform":"nt_x86-64","Sr":"OEM"}],"SupportedPlatforms":false},"ReleaseDate":"2025-07-24T05:08:28","RevisionHistory":[{"ReleaseNotes":[{"Enhancements":"<p>New vesion with 1.16</p>","Fixes":"","Lang":"en"},{"Enhancements":"<p>新バージョン1.16</p>","Fixes":"","Lang":"ja"},{"Enhancements":"<p>New vesion with 1.16</p>","Fixes":"","Lang":"cn"}],"Version":"1.16"},{"ReleaseNotes":[{"Enhancements":"<ul><li>Improved DFC settings to ensure proper operation and accurate data reading.</li><li>Enhanced SES functionality so certain settings remain unchanged.</li></ul>","Fixes":"<ul><li>Fixed an issue with PWDIS that could cause errors.</li><li>Resolved a problem where adding drives to bays 11 and 12 caused resets or missing drives.</li></ul>","Lang":"en"},{"Enhancements":"<ul><li>適切な操作と正確なデータ読み取りを保証するために DFC設定が改善されました。</li><li>強化されたSES機能により、特定の設定は変更されません。</li></ul>","Fixes":"<ul><li>エラーを引き起こす可能性があるPWDISの問題を修正しました。</li><li>ベイ 11 および 12にドライブを追加するとリセットが発生したり、ドライブが見つからなくなったりする問題を解決しました。</li></ul>","Lang":"ja"},{"Enhancements":"<ul><li>Improved DFC settings to ensure proper operation and accurate data reading.</li><li>Enhanced SES functionality so certain settings remain unchanged.</li></ul>","Fixes":"<ul><li>Fixed an issue with PWDIS that could cause errors.</li><li>Resolved a problem where adding drives to bays 11 and 12 caused resets or missing drives.</li></ul>","Lang":"cn"}],"Version":"1.16"}],"SWKeys":[{"Name":"UBM5PIC","SWKeyExpectedPath":"firmware:sd:ubm"}],"SchemaVersion":"2.0.0.0","SupportedProducts":[{"Family":"A56","Model":"HPE ProLiant DL325 Gen11 Server"},{"Family":"A55","Model":"HPE ProLiant DL365 Gen11 Server"},{"Family":"I45","Model":"HPE Synergy 480 Gen11 Compute Module"},{"Family":"U54","Model":"HPE ProLiant DL380 Gen11 Server"},{"Family":"U54","Model":"HPE ProLiant ML350 Gen11 Server"},{"Family":"U54","Model":"HPE ProLiant DL360 Gen11 Server"},{"Family":"U58","Model":"HPE Alletra Storage Server 4120"},{"Family":"U58","Model":"HPE Alletra 4110 Server"},{"Family":"U63","Model":"HPE ProLiant DL320 Gen11 Server"},{"Family":"A56","Model":"HPE ProLiant DL345 Gen11 Server"},{"Family":"A55","Model":"HPE ProLiant DL385 Gen11 Server"},{"Family":"U59","Model":"HPE ProLiant DL560 Gen11 Server"}],"UpgradeRequirements":"Recommended"},"PackageFormat":"FWPKG-v2","Type":"Firmware","UpdatableBy":["Bmc"],"VersionId":"ec125a04c65848c09f2ceb45d6aa89b6"}]}],"Prerequisites":[],"SchemaVersion":"1.0"}