Printable version

Drivers & software

* RECOMMENDED * System ROMPaq Firmware Upgrade for HP ProLiant DL380 G7 (P67) Servers (For USB Key-Media)

By downloading, you agree to the terms and conditions of the Hewlett Packard Enterprise Software License Agreement.
Note:  Some software requires a valid warranty, current Hewlett Packard Enterprise support contract, or a license fee.

Type: BIOS (Entitlement Required) - System ROM
Version: 2015.08.16 (A)(1 Oct 2015)
Operating System(s):
Asianux 3 | View all
File name: SP73030.exe (4.1 MB)
This release provides updated system ROM images for the latest maintenance releases of HP ProLiant DL380 G7 (P67) Servers.

To ensure the integrity of your download, HP recommends verifying your results with this MD5 Checksum value:

0463ec011003e5b15497fdfc9b5dce55 SP73030.exe

Reboot Requirement:
Reboot is required after installation for updates to take effect and hardware stability to be maintained.


Installation:

1. Obtain a formatted USB Key media.

2. Download the SoftPaq to a directory on a system running Microsoft Windows 2000, Microsoft Windows XP, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows Server 2008, or Microsoft Windows Server 2008 R2 and change to that directory.

3. From that drive and directory, execute the downloaded SoftPaq file: Simply double click on the SPxxxxx.exe file and follow the installation wizard to complete the SoftPaq installation process. At the end of a successful installation of the SoftPaq a web page will automatically appear to provide you with the different methods for restoring and/or upgrading the firmware on the system.

4. After the USB Key is created, you may delete the downloaded file if you wish.

5. Insert this USB Key into the USB Key port of the system to be updated and power the system on to boot to the USB Key.

 

 


End User License Agreements:
Hewlett-Packard End User License Agreement


Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important:

Important Notes:

None

Deliverable Name:

HP ProLiant DL380 G7 System ROM - P67

Release Version:

08/16/2015

Last Recommended or Critical Revision:

08/16/2015

Previous Revision:

07/02/2013

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

While HP ProLiant servers using impacted Intel processors are not vulnerable to the specific attack announced publicly at the Blackhat USA 2015 security conference, this BIOS update includes updated microcodes from Intel which prevent the possibility of exploiting the processor vulnerability that make the attack possible. This Intel processor vulnerability is NOT unique to HP ProLiant servers.

Known Issues:

None

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

While HP ProLiant servers using impacted Intel processors are not vulnerable to the specific attack announced publicly at the Blackhat USA 2015 security conference, this BIOS update includes updated microcodes from Intel which prevent the possibility of exploiting the processor vulnerability that make the attack possible. This Intel processor vulnerability is NOT unique to HP ProLiant servers.

Known Issues:

None

Important Notes:

None

Deliverable Name:

HP ProLiant DL380 G7 System ROM - P67

Release Version:

08/16/2015

Last Recommended or Critical Revision:

08/16/2015

Previous Revision:

07/02/2013

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

While HP ProLiant servers using impacted Intel processors are not vulnerable to the specific attack announced publicly at the Blackhat USA 2015 security conference, this BIOS update includes updated microcodes from Intel which prevent the possibility of exploiting the processor vulnerability that make the attack possible. This Intel processor vulnerability is NOT unique to HP ProLiant servers.

Known Issues:

None
Version:2018.05.21(A) (6 Jul 2018)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities.  These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis.  These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors.  Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

Firmware Dependencies:

None

Problems Fixed:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities.  These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis.  These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors.  Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

Known Issues:

None


Version:2018.02.22(A) (22 Mar 2018)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.  Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Firmware Dependencies:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None


Version:2015.08.16 (A) (1 Oct 2015)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

While HP ProLiant servers using impacted Intel processors are not vulnerable to the specific attack announced publicly at the Blackhat USA 2015 security conference, this BIOS update includes updated microcodes from Intel which prevent the possibility of exploiting the processor vulnerability that make the attack possible. This Intel processor vulnerability is NOT unique to HP ProLiant servers.

Known Issues:

None

Version:2013.07.02(A) (14 Aug 2013)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

Enhancing the flash upgrade process requires modifications to both the System ROM and the flash update utility, the System ROM revision cannot be downgraded with the flash components available on the HP Support site after updating to this revision of the System ROM. A customer can downgrade the System ROM by creating a new flash component with the older System ROM revision as indicated in Advisory C02838375 available at the following link: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?locale=en_US&objectID=c02838375

Firmware Dependencies:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Addressed an issue with the Intel Xeon Processor X5675, Intel Xeon Processor X5690, and Intel Xeon Processor X5687 where a rare and complex combination of data and environmental conditions may result in some instructions not executing properly causing unpredictable system behavior. This issue is not unique to HP ProLiant servers and could impact any system using the affected processors listed above. This revision of the System ROM contains and updated version of Intel's microcode that addresses this issue. This System ROM upgrade is considered a critical fix for customers utilizing the affected processors. This issue does not impact any processors that are not listed above.

Addressed an issue where the platform may experience networking issues under heavy workloads with Operating Systems, such as Linux RedHat 6.2, and IRQ Balancing enabled in the Operating System. As a result of this issue, software may lose interrupts, receive spurious interrupts or cause a network disconnect.

Known Issues:

None

Version:2012.12.02 (A) (11 Jan 2013)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

After updating to this revision of the System ROM, the System ROM revision cannot be downgraded with the flash components available on the HP Support site for any ROM version 01/30/2011 or earlier. A customer can downgrade the System ROM by creating a new flash component with the older System ROM revision as indicated in Advisory C02838375 available at the following link: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?locale=en_US&objectID=c02838375

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue where the ROM Based Setup Utility (RBSU) Command Line Interface (CLI) would not set the QPI Bandwidth Optimization (RTID) feature properly.

Known Issues:

None
Enhancements

Optimized the memory settings to improve the reliability of the memory system.


Version:2011.05.05(A) (6 Jul 2011)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue that may result in any of the following conditions: operating system stops responding, unexpected system reset, Blue Screen when using a Microsoft Windows operating system, kernel panic when using a Linux operating system, or Purple Screen when using VMware ESX. A message may be displayed by the operating system or logged in the HP Integrated Management Log (IML) when this issue occurs indicating an "Uncorrectable Machine Check Exception." However, there are instances where the system resets before the operating system displays an error message and instances where the IML contains no log entry when this issue occurs. This issue does not occur if the Minimum Processor Idle State is configured for No C-states or C1E-state. The system is susceptible to this issue in the default Minimum Processor Idle State configuration.

Resolved an issue where PCI-Express Gen 3 option cards would run at PCI-Express Gen 1 speeds rather than the appropriate behavior of running at PCI-Express Gen 2 speeds. This server supports a maximum PCI-Express speed of Gen 2.

Resolved an issue in which uncorrectable memory errors (or other fatal system errors) will not be logged to the HP Integrated Management Log (IML) when using some revisions of VMware ESX Server. These errors will result in a fatal error (Purple Screen of Death - PSoD) under VMware ESX, but there will not be any indication of the error type (including no indication of an uncorrectable memory error or what DIMM has failed). A VMware ESX Server issue which can result in uncorrectable memory errors this is addressed in VMware ESX 4.1 U1 and VMware ESX 4.0 U3. This System ROM revision addresses the logging of errors to the IML.

Known Issues:

None
Enhancements

Enhanced HP’s Memory Pre-failure Alert support with HP Advanced Memory Error Detection Technology. This innovation analyzes multiple parameters of correctable memory error events and intelligently detects when the system is at an increased probability of non-recoverable memory conditions that would result in unplanned downtime or when correctable memory errors may degrade system performance. HP Advanced Memory Error Detection Technology will increase server uptime by accurately determining when a server administrator should schedule planned maintenance to replace DIMMs preventing unnecessary planned downtime and reducing the probability of unplanned downtime.

Enhanced DIMM initialization such that the system will continue to boot with failed DIMM(s) installed (with those DIMM(s) not available to the operating system) in some instances that would have previously resulted in a hang early in the system boot process without any information displayed on the screen.

Added latest product names of optional expansion cards for display in the ROM-Based Setup Utility (RBSU).


Version:2011.01.30 (A) (7 Mar 2011)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue where Online Spare (OLS) Advanced Memory Protection Mode does not function properly when a system contains six 32 GB DIMMs on any processor (two 32 GB DIMMs per channel for all 3 channels on the processor). When Online Spare Mode is enabled for a system with six 32 GB DIMMs on a processor, the system will NOT be protected by the spare memory and one channel of memory per processor in this configuration will not be available to the operating system. The system will indicate it is in Advanced ECC mode during system boot, but not all installed memory will be available to the operating system as would normally occur in Advanced ECC Mode. Customers configuring their system for Online Spare Mode with six 32 GB DIMMs per installed processor should update their System ROM. Note: Because 32 GB DIMMs are quad-rank, six 32 GB DIMMs per processor is the maximum supported.

Resolved a very rare issue where the system may either hang during system boot or boot with configuration options set incorrectly when non-volatile storage becomes corrupt. This is normally seen as the system hanging during system boot without anything displayed to video. Once the system gets into this state, the maintenance jumper can be utilized to recover operation of the system and restore configuration defaults. This revision of the System ROM will restore configuration defaults when non-volatile storage becomes corrupt.

Improved the logging of Smart Array Accelerator Battery and Smart Array Accelerator Super-Cap information in the Integrated Management Log (IML) to clearly indicate what actions a customer should take when the battery or super-cap is not installed, requires replacement, or is charging.

Resolved an issue where the iLO TEXTCONs feature would not function properly with the latest Linux kernels, including RHEL 6 and SLES 11 SP1. The issue is usually seen as TEXTCONs data no longer being received once the operating system has loaded.

Resolved an issue where the system may not be able to install an operating system to an iSCSI-based storage solution when using the local optical drive.

Resolved an issue where the system would not boot from iLO Virtual USB devices when configured with multiple local USB devices. This issue is usually seen as a failure to boot an iLO Virtual Medial USB key when 2 or more USB keys are installed locally in the server. iLO Virtual Devices will now always have priority over local USB devices.

Resolved an issue where the system did not properly modify the processor's power state (P-state) based on workload when the system is configured with Intel Xeon 5687 processors and the HP Power Regulator Mode is configured to OS Control Mode in the ROM-Based Setup Utility (RBSU). The processor would always run in its maximum power/performance state rather than modifying the power state based on the workload.

Known Issues:

None
Enhancements

Added latest product names of optional expansion cards for display in the ROM-Based Setup Utility (RBSU).


Version:2010.12.01 (A) (18 Dec 2010)
Fixes

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.


Important Notes:

Recommended to upgrade to firmware version 2010.12.01 if Lockstep Mode is enabled.

Users should update to this latest firmware revision for any systems running with the 10/19/2010 System ROM revisions. The 10/19/2010 System ROM revisions have a known issue which can result in uncorrectable memory errors and correctable memory threshold errors and should not be utilized. These errors are due to a firmware issue and not a result of a problem with the system hardware or installed DIMMs.

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue where Uncorrectable Memory Errors will be logged incorrectly to the Integrated Management Log (IML) when the Advanced Memory Protection Mode is configured for Lockstep Mode in the ROM-Based Setup Utility (RBSU). The Uncorrectable Memory Errors will indicate the incorrect DIMM as failed. If a system is configured for Lockstep Mode and an Uncorrectable Memory Error occurs, the DIMM indicated in the IML should not be replaced if the system is using a revision of the System ROM older than this revision. The correct DIMM will be indicated on the DIMM LEDs if the server includes DIMM LEDs. Note that Lockstep Mode is NOT the default Advanced Memory Protection Mode. If the Advanced Memory Protection Mode was never modified from its default setting, the system will not be affected by this issue.

Updated the embedded PXE firmware to version 6.0.11 to resolve an issue where the server may experience slow network boot performance due to TFTP timeouts.

Known Issues:

None
Enhancements

Enhanced the correctable memory error threshold error event handling to isolate degraded DIMM issues to a single DIMM when the Advanced Memory Protection Mode is configured for Lockstep Mode when the system is utilizing Intel Xeon 5600-series processors. With Intel Xeon 5500-series processors, correctable memory error threshold events can only be isolated to a pair of DIMMs when the system is configured to Lockstep Mode.

Added support to allow industry standard utilities to display the actual operating frequency of the installed memory. This is supporting a newly defined industry standard field. Utilities to display this information may not yet be available.

Added a new ROM Based Setup Utility (RBSU) Advanced Performance Tuning option known as QPI Bandwidth Optimization(RTID) to optimize link bandwidth settings for 2-Socket Intel Xeon 5600 series processors. These settings (also known as RTIDs) allow the user to balance bandwidth allocated between processors, memory, and I/O. While the balanced option (default) is recommended for the majority of customers, some benchmarks and workloads may show improved performance using different settings that allow optimization for memory streaming or I/O streaming. Customers that deploy I/O intensive applications such as seen with multiple GPUs, might see an improvement in GPU processing throughput when using the Optimized for I/O setting. This option is not available for systems utilizing Intel Xeon 5500-series processors.

Added latest product names of optional expansion cards for display in the ROM-Based Setup Utility (RBSU).

Added the Power-On Logo option to the ROM-Based Setup Utility (RBSU) to allow the system to always display option ROM messages during system boot.

Improved the thermal operation of the server to better cool PCI-E expansion cards. This change may help address issues where devices that are installed in PCI-E riser slots were being throttled or causing the system to shutdown due to a premature thermal event.


Version:2010.09.30 (A) (15 Oct 2010)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Resolved a System ROM issue that can result in the server locking up intermittently during system boot (POST). When this issue occurs, the server lock-up will be prior to any video output being displayed. If the server does not lock-up during system boot, the server will function properly. This issue can occur on both cold boots and warm boots.

Known Issues:

None

Version:2010.08.16 (A) (10 Sep 2010)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

For servers using Intel Xeon processor 5600 series, resolve an issue where an Uncorrectable Memory Error or Exceeded Correctable Memory Error Threshold Event may occur. These errors may result in events logged to the Integrated Management Log (IML) and the System Health LED illuminating blinking amber. Additionally, if an Uncorrectable Memory Error occurs, the system will reset and error messages indicating the failure will be displayed during Power On Self Test (POST). These errors do not indicate a problem with the memory DIMMs or the server system board. This issue is not unique to HP ProLiant servers and is resolved by a new revision of Intel's microcode for Intel Xeon processor 5600 series that is implemented in this version of the System ROM. Intel Xeon processor 5500 series are not affected by this issue. Note: After completing the flash upgrade process for this revision of the System ROM, the server should be power cycled.

Known Issues:

None

Version:2010.05.14 (A) (24 Jun 2010)
Fixes

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue where the system may experience a hang during the subsequent boot after changing the Processor Core Disable option in the ROM Based Setup Utility or via the SmartStart Scripting Toolkit. This issue is only seen if the system is warm reset via the iLO power management interface or from a CTRL-ALT-DEL instead of properly exiting the configuration utilities.

Resolved an issue where a VT-d aware Operating System may experience a hang when the ROM Based Setup Utility (RBSU) option for VT-d is enabled (it is enabled by default). If using Intel VT-d support with the Xen hypervisor, the System ROM must be updated to this revision.

Known Issues:

None
Enhancements

Added new Advanced Performance Options in the ROM-Based Setup Utility (RBSU) for DCU Prefetcher and Data Reuse. These options are only available when the system is using Intel 5600-series Xeon processors. These options are enabled by default (and are always enabled on previous revisions of the System ROM when using Intel 5600-series Xeon processors). While these options should remain enabled in most environments for optimum performance, in some high CPU-utilization environments disabling DCU Prefetcher and/or Data Reuse will improve overall performance. HP measurements indicate an ~8% performance increase with the SPECjbb2005 benchmark and ~4.6% performance increase with SAP when DCU Prefetcher and Data Reuse are disabled.

Added a new Turbo Boost Optimization option in the ROM Based Setup Utility (RBSU). This option allows the user to choose between the traditional performance optimized behavior or a more power efficient behavior. This option is only valid when the Intel Turbo Boost Technology feature is enabled.

Added latest product names of optional expansion cards for display in the ROM-Based Setup Utility (RBSU).


Version:2010.03.30 (A) (25 May 2010)
Enhancements

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Enhancements/New Features:

This is the initial version of the firmware.

Known Issues:

None


Type: BIOS (Entitlement Required) - System ROM
Version: 2015.08.16 (A)(1 Oct 2015)
Operating System(s):
Asianux 3
Citrix XenServer 5.x
Debian GNU/Linux 5.0 (AMD64/EM64T)
Debian GNU/Linux 5.0 (x86)
Microsoft Windows HPC Server 2008 R2
Microsoft Windows Server 2003
Microsoft Windows Server 2003 for 64-bit Extended Systems
Microsoft Windows Server 2008 Essential Business
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 Small Business
Microsoft Windows Server 2008 W32
Microsoft Windows Server 2008 x64
Microsoft Windows Server 2012
Microsoft Windows Server 2012 Essentials
Microsoft Windows Server 2012 R2
Microsoft Windows Small Business Server 2011 Standard and Essentials
OS Independent
Oracle Linux 5 (AMD64/EM64T)
Oracle Linux 5 (x86)
Oracle Linux 6 (AMD64/EMT64)
Oracle Linux 6 (x86)
Red Hat Enterprise Linux 4 (AMD64/EM64T)
Red Hat Enterprise Linux 4 (x86)
Red Hat Enterprise Linux 5 Server (x86)
Red Hat Enterprise Linux 5 Server (x86-64)
Red Hat Enterprise Linux 6 Server (x86)
Red Hat Enterprise Linux 6 Server (x86-64)
SUSE Linux Enterprise Server 10 (AMD64/EM64T)
SUSE Linux Enterprise Server 10 (x86)
SUSE Linux Enterprise Server 11 (AMD64/EM64T)
SUSE Linux Enterprise Server 11 (x86)
Solaris 10 for x86 Systems
Ubuntu 10.04 LT (x86)
Ubuntu 10.04 LTS (AMD64/EM64T)
VMware ESX/ESXi 4.0
VMware ESX/ESXi 4.1
VMware ESX/ESXi Server 3.5
VMware ESXi 5.0

Description

This release provides updated system ROM images for the latest maintenance releases of HP ProLiant DL380 G7 (P67) Servers.

Installation Instructions

To ensure the integrity of your download, HP recommends verifying your results with this MD5 Checksum value:

0463ec011003e5b15497fdfc9b5dce55 SP73030.exe

Reboot Requirement:
Reboot is required after installation for updates to take effect and hardware stability to be maintained.


Installation:

1. Obtain a formatted USB Key media.

2. Download the SoftPaq to a directory on a system running Microsoft Windows 2000, Microsoft Windows XP, Microsoft Windows Vista, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows Server 2008, or Microsoft Windows Server 2008 R2 and change to that directory.

3. From that drive and directory, execute the downloaded SoftPaq file: Simply double click on the SPxxxxx.exe file and follow the installation wizard to complete the SoftPaq installation process. At the end of a successful installation of the SoftPaq a web page will automatically appear to provide you with the different methods for restoring and/or upgrading the firmware on the system.

4. After the USB Key is created, you may delete the downloaded file if you wish.

5. Insert this USB Key into the USB Key port of the system to be updated and power the system on to boot to the USB Key.

 

 


Release Notes

End User License Agreements:
Hewlett-Packard End User License Agreement


Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important:

Important Notes:

None

Deliverable Name:

HP ProLiant DL380 G7 System ROM - P67

Release Version:

08/16/2015

Last Recommended or Critical Revision:

08/16/2015

Previous Revision:

07/02/2013

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

While HP ProLiant servers using impacted Intel processors are not vulnerable to the specific attack announced publicly at the Blackhat USA 2015 security conference, this BIOS update includes updated microcodes from Intel which prevent the possibility of exploiting the processor vulnerability that make the attack possible. This Intel processor vulnerability is NOT unique to HP ProLiant servers.

Known Issues:

None

Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

While HP ProLiant servers using impacted Intel processors are not vulnerable to the specific attack announced publicly at the Blackhat USA 2015 security conference, this BIOS update includes updated microcodes from Intel which prevent the possibility of exploiting the processor vulnerability that make the attack possible. This Intel processor vulnerability is NOT unique to HP ProLiant servers.

Known Issues:

None

Important

Important Notes:

None

Deliverable Name:

HP ProLiant DL380 G7 System ROM - P67

Release Version:

08/16/2015

Last Recommended or Critical Revision:

08/16/2015

Previous Revision:

07/02/2013

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

While HP ProLiant servers using impacted Intel processors are not vulnerable to the specific attack announced publicly at the Blackhat USA 2015 security conference, this BIOS update includes updated microcodes from Intel which prevent the possibility of exploiting the processor vulnerability that make the attack possible. This Intel processor vulnerability is NOT unique to HP ProLiant servers.

Known Issues:

None

Revision History

Version:2018.05.21(A) (6 Jul 2018)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities.  These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis.  These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors.  Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

Firmware Dependencies:

None

Problems Fixed:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities.  These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis.  These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors.  Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

Known Issues:

None


Version:2018.02.22(A) (22 Mar 2018)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation.  Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Firmware Dependencies:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None


Version:2015.08.16 (A) (1 Oct 2015)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

While HP ProLiant servers using impacted Intel processors are not vulnerable to the specific attack announced publicly at the Blackhat USA 2015 security conference, this BIOS update includes updated microcodes from Intel which prevent the possibility of exploiting the processor vulnerability that make the attack possible. This Intel processor vulnerability is NOT unique to HP ProLiant servers.

Known Issues:

None

Version:2013.07.02(A) (14 Aug 2013)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

Enhancing the flash upgrade process requires modifications to both the System ROM and the flash update utility, the System ROM revision cannot be downgraded with the flash components available on the HP Support site after updating to this revision of the System ROM. A customer can downgrade the System ROM by creating a new flash component with the older System ROM revision as indicated in Advisory C02838375 available at the following link: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?locale=en_US&objectID=c02838375

Firmware Dependencies:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Addressed an issue with the Intel Xeon Processor X5675, Intel Xeon Processor X5690, and Intel Xeon Processor X5687 where a rare and complex combination of data and environmental conditions may result in some instructions not executing properly causing unpredictable system behavior. This issue is not unique to HP ProLiant servers and could impact any system using the affected processors listed above. This revision of the System ROM contains and updated version of Intel's microcode that addresses this issue. This System ROM upgrade is considered a critical fix for customers utilizing the affected processors. This issue does not impact any processors that are not listed above.

Addressed an issue where the platform may experience networking issues under heavy workloads with Operating Systems, such as Linux RedHat 6.2, and IRQ Balancing enabled in the Operating System. As a result of this issue, software may lose interrupts, receive spurious interrupts or cause a network disconnect.

Known Issues:

None

Version:2012.12.02 (A) (11 Jan 2013)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

After updating to this revision of the System ROM, the System ROM revision cannot be downgraded with the flash components available on the HP Support site for any ROM version 01/30/2011 or earlier. A customer can downgrade the System ROM by creating a new flash component with the older System ROM revision as indicated in Advisory C02838375 available at the following link: http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?locale=en_US&objectID=c02838375

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue where the ROM Based Setup Utility (RBSU) Command Line Interface (CLI) would not set the QPI Bandwidth Optimization (RTID) feature properly.

Known Issues:

None
Enhancements

Optimized the memory settings to improve the reliability of the memory system.


Version:2011.05.05(A) (6 Jul 2011)
Fixes

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue that may result in any of the following conditions: operating system stops responding, unexpected system reset, Blue Screen when using a Microsoft Windows operating system, kernel panic when using a Linux operating system, or Purple Screen when using VMware ESX. A message may be displayed by the operating system or logged in the HP Integrated Management Log (IML) when this issue occurs indicating an "Uncorrectable Machine Check Exception." However, there are instances where the system resets before the operating system displays an error message and instances where the IML contains no log entry when this issue occurs. This issue does not occur if the Minimum Processor Idle State is configured for No C-states or C1E-state. The system is susceptible to this issue in the default Minimum Processor Idle State configuration.

Resolved an issue where PCI-Express Gen 3 option cards would run at PCI-Express Gen 1 speeds rather than the appropriate behavior of running at PCI-Express Gen 2 speeds. This server supports a maximum PCI-Express speed of Gen 2.

Resolved an issue in which uncorrectable memory errors (or other fatal system errors) will not be logged to the HP Integrated Management Log (IML) when using some revisions of VMware ESX Server. These errors will result in a fatal error (Purple Screen of Death - PSoD) under VMware ESX, but there will not be any indication of the error type (including no indication of an uncorrectable memory error or what DIMM has failed). A VMware ESX Server issue which can result in uncorrectable memory errors this is addressed in VMware ESX 4.1 U1 and VMware ESX 4.0 U3. This System ROM revision addresses the logging of errors to the IML.

Known Issues:

None
Enhancements

Enhanced HP’s Memory Pre-failure Alert support with HP Advanced Memory Error Detection Technology. This innovation analyzes multiple parameters of correctable memory error events and intelligently detects when the system is at an increased probability of non-recoverable memory conditions that would result in unplanned downtime or when correctable memory errors may degrade system performance. HP Advanced Memory Error Detection Technology will increase server uptime by accurately determining when a server administrator should schedule planned maintenance to replace DIMMs preventing unnecessary planned downtime and reducing the probability of unplanned downtime.

Enhanced DIMM initialization such that the system will continue to boot with failed DIMM(s) installed (with those DIMM(s) not available to the operating system) in some instances that would have previously resulted in a hang early in the system boot process without any information displayed on the screen.

Added latest product names of optional expansion cards for display in the ROM-Based Setup Utility (RBSU).


Version:2011.01.30 (A) (7 Mar 2011)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue where Online Spare (OLS) Advanced Memory Protection Mode does not function properly when a system contains six 32 GB DIMMs on any processor (two 32 GB DIMMs per channel for all 3 channels on the processor). When Online Spare Mode is enabled for a system with six 32 GB DIMMs on a processor, the system will NOT be protected by the spare memory and one channel of memory per processor in this configuration will not be available to the operating system. The system will indicate it is in Advanced ECC mode during system boot, but not all installed memory will be available to the operating system as would normally occur in Advanced ECC Mode. Customers configuring their system for Online Spare Mode with six 32 GB DIMMs per installed processor should update their System ROM. Note: Because 32 GB DIMMs are quad-rank, six 32 GB DIMMs per processor is the maximum supported.

Resolved a very rare issue where the system may either hang during system boot or boot with configuration options set incorrectly when non-volatile storage becomes corrupt. This is normally seen as the system hanging during system boot without anything displayed to video. Once the system gets into this state, the maintenance jumper can be utilized to recover operation of the system and restore configuration defaults. This revision of the System ROM will restore configuration defaults when non-volatile storage becomes corrupt.

Improved the logging of Smart Array Accelerator Battery and Smart Array Accelerator Super-Cap information in the Integrated Management Log (IML) to clearly indicate what actions a customer should take when the battery or super-cap is not installed, requires replacement, or is charging.

Resolved an issue where the iLO TEXTCONs feature would not function properly with the latest Linux kernels, including RHEL 6 and SLES 11 SP1. The issue is usually seen as TEXTCONs data no longer being received once the operating system has loaded.

Resolved an issue where the system may not be able to install an operating system to an iSCSI-based storage solution when using the local optical drive.

Resolved an issue where the system would not boot from iLO Virtual USB devices when configured with multiple local USB devices. This issue is usually seen as a failure to boot an iLO Virtual Medial USB key when 2 or more USB keys are installed locally in the server. iLO Virtual Devices will now always have priority over local USB devices.

Resolved an issue where the system did not properly modify the processor's power state (P-state) based on workload when the system is configured with Intel Xeon 5687 processors and the HP Power Regulator Mode is configured to OS Control Mode in the ROM-Based Setup Utility (RBSU). The processor would always run in its maximum power/performance state rather than modifying the power state based on the workload.

Known Issues:

None
Enhancements

Added latest product names of optional expansion cards for display in the ROM-Based Setup Utility (RBSU).


Version:2010.12.01 (A) (18 Dec 2010)
Fixes

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.


Important Notes:

Recommended to upgrade to firmware version 2010.12.01 if Lockstep Mode is enabled.

Users should update to this latest firmware revision for any systems running with the 10/19/2010 System ROM revisions. The 10/19/2010 System ROM revisions have a known issue which can result in uncorrectable memory errors and correctable memory threshold errors and should not be utilized. These errors are due to a firmware issue and not a result of a problem with the system hardware or installed DIMMs.

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue where Uncorrectable Memory Errors will be logged incorrectly to the Integrated Management Log (IML) when the Advanced Memory Protection Mode is configured for Lockstep Mode in the ROM-Based Setup Utility (RBSU). The Uncorrectable Memory Errors will indicate the incorrect DIMM as failed. If a system is configured for Lockstep Mode and an Uncorrectable Memory Error occurs, the DIMM indicated in the IML should not be replaced if the system is using a revision of the System ROM older than this revision. The correct DIMM will be indicated on the DIMM LEDs if the server includes DIMM LEDs. Note that Lockstep Mode is NOT the default Advanced Memory Protection Mode. If the Advanced Memory Protection Mode was never modified from its default setting, the system will not be affected by this issue.

Updated the embedded PXE firmware to version 6.0.11 to resolve an issue where the server may experience slow network boot performance due to TFTP timeouts.

Known Issues:

None
Enhancements

Enhanced the correctable memory error threshold error event handling to isolate degraded DIMM issues to a single DIMM when the Advanced Memory Protection Mode is configured for Lockstep Mode when the system is utilizing Intel Xeon 5600-series processors. With Intel Xeon 5500-series processors, correctable memory error threshold events can only be isolated to a pair of DIMMs when the system is configured to Lockstep Mode.

Added support to allow industry standard utilities to display the actual operating frequency of the installed memory. This is supporting a newly defined industry standard field. Utilities to display this information may not yet be available.

Added a new ROM Based Setup Utility (RBSU) Advanced Performance Tuning option known as QPI Bandwidth Optimization(RTID) to optimize link bandwidth settings for 2-Socket Intel Xeon 5600 series processors. These settings (also known as RTIDs) allow the user to balance bandwidth allocated between processors, memory, and I/O. While the balanced option (default) is recommended for the majority of customers, some benchmarks and workloads may show improved performance using different settings that allow optimization for memory streaming or I/O streaming. Customers that deploy I/O intensive applications such as seen with multiple GPUs, might see an improvement in GPU processing throughput when using the Optimized for I/O setting. This option is not available for systems utilizing Intel Xeon 5500-series processors.

Added latest product names of optional expansion cards for display in the ROM-Based Setup Utility (RBSU).

Added the Power-On Logo option to the ROM-Based Setup Utility (RBSU) to allow the system to always display option ROM messages during system boot.

Improved the thermal operation of the server to better cool PCI-E expansion cards. This change may help address issues where devices that are installed in PCI-E riser slots were being throttled or causing the system to shutdown due to a premature thermal event.


Version:2010.09.30 (A) (15 Oct 2010)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Resolved a System ROM issue that can result in the server locking up intermittently during system boot (POST). When this issue occurs, the server lock-up will be prior to any video output being displayed. If the server does not lock-up during system boot, the server will function properly. This issue can occur on both cold boots and warm boots.

Known Issues:

None

Version:2010.08.16 (A) (10 Sep 2010)
Fixes

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

For servers using Intel Xeon processor 5600 series, resolve an issue where an Uncorrectable Memory Error or Exceeded Correctable Memory Error Threshold Event may occur. These errors may result in events logged to the Integrated Management Log (IML) and the System Health LED illuminating blinking amber. Additionally, if an Uncorrectable Memory Error occurs, the system will reset and error messages indicating the failure will be displayed during Power On Self Test (POST). These errors do not indicate a problem with the memory DIMMs or the server system board. This issue is not unique to HP ProLiant servers and is resolved by a new revision of Intel's microcode for Intel Xeon processor 5600 series that is implemented in this version of the System ROM. Intel Xeon processor 5500 series are not affected by this issue. Note: After completing the flash upgrade process for this revision of the System ROM, the server should be power cycled.

Known Issues:

None

Version:2010.05.14 (A) (24 Jun 2010)
Fixes

Upgrade Requirement:
Optional - Users should update to this version if their system is affected by one of the documented fixes or if there is a desire to utilize any of the enhanced functionality provided by this version.


Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Resolved an issue where the system may experience a hang during the subsequent boot after changing the Processor Core Disable option in the ROM Based Setup Utility or via the SmartStart Scripting Toolkit. This issue is only seen if the system is warm reset via the iLO power management interface or from a CTRL-ALT-DEL instead of properly exiting the configuration utilities.

Resolved an issue where a VT-d aware Operating System may experience a hang when the ROM Based Setup Utility (RBSU) option for VT-d is enabled (it is enabled by default). If using Intel VT-d support with the Xen hypervisor, the System ROM must be updated to this revision.

Known Issues:

None
Enhancements

Added new Advanced Performance Options in the ROM-Based Setup Utility (RBSU) for DCU Prefetcher and Data Reuse. These options are only available when the system is using Intel 5600-series Xeon processors. These options are enabled by default (and are always enabled on previous revisions of the System ROM when using Intel 5600-series Xeon processors). While these options should remain enabled in most environments for optimum performance, in some high CPU-utilization environments disabling DCU Prefetcher and/or Data Reuse will improve overall performance. HP measurements indicate an ~8% performance increase with the SPECjbb2005 benchmark and ~4.6% performance increase with SAP when DCU Prefetcher and Data Reuse are disabled.

Added a new Turbo Boost Optimization option in the ROM Based Setup Utility (RBSU). This option allows the user to choose between the traditional performance optimized behavior or a more power efficient behavior. This option is only valid when the Intel Turbo Boost Technology feature is enabled.

Added latest product names of optional expansion cards for display in the ROM-Based Setup Utility (RBSU).


Version:2010.03.30 (A) (25 May 2010)
Enhancements

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.


Important Notes:

None

Firmware Dependencies:

None

Enhancements/New Features:

This is the initial version of the firmware.

Known Issues:

None