Hp Proliant Ml110 G7 Base System Device Driver For Mac

I have 3 ML110 G7's with 4 Gb RAM each that I'm installing Windows Small Business Server 2011 Essentials (which uses Server 2008 R2 as it's base) on and see these things on all 3 servers. I'm guessing this is by design (with the possible exception of #1) but I want to check to be sure.

Printable version

** CRITICAL ** Online ROM Flash Component for Windows - HP ProLiant ML110 G7/DL120 G7 (J01) Servers

By downloading, you agree to the terms and conditions of the Hewlett Packard Enterprise Software License Agreement.
Note: Some software requires a valid warranty, current Hewlett Packard Enterprise support contract, or a license fee.

Type:BIOS (Entitlement Required) - System ROM
Version:2013.07.01 (B)(25 Aug 2014)
Operating System(s):
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 Small Business
Microsoft Windows Server 2008 W32
Microsoft Windows Server 2008 x64
Microsoft Windows Server 2012
Microsoft Windows Server 2012 Essentials
Microsoft Windows Server 2012 R2
Microsoft Windows Small Business Server 2011 Standard and Essentials
Microsoft Windows Server 2008 Essential Business
File name:cp024022.exe (1.7 MB)
This component provides updated system firmware that can be installed directly on supported Operating Systems. Additionally, when used in conjunction with HP Smart Update Manager (HPSUM), this Smart Component allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.

To ensure the integrity of your download, HP recommends verifying your results with this MD5 Checksum value:

363dca904eca76465418bc810598c3a2cp024022.exe

Reboot Requirement:
Reboot is required after installation for updates to take effect and hardware stability to be maintained.

Installation:

To update firmware from Windows operating system on target server:

1. Place the Smart Component in a temporary directory.
2. From the same directory, run the Smart Component by double-clicking it.
3. When the Smart Component dialog window displays, click the Install button to initiate the firmware upgrade.
4. Reboot your system if you would like the update to take effect immediately.


To use HPSUM on the HP Smart Update Firmware DVD (version 9.00 and later) or the Service Pack for ProLiant 2011.07.0 (and later):

1. Place the Firmware DVD or Service Pack for ProLiant on a USB key using the HP USB Key Creator Utility.
2. Place the firmware to be used for updating in the directory, /HPFWUPxxx/hp/swpackages on the USB key.
3. Boot from the newly created USB key.
4. Follow the on-screen directions to complete the firmware update.

End User License Agreements:
Hewlett-Packard End User License Agreement

Upgrade Requirement:
Critical - HP requires users update to this version immediately.

Important:

Important Notes:
Component packaging has been updated; no impact to product’s functionality.
Deliverable Name:

HP ProLiant ML110 G7 and DL120 G7 System ROM - J01

Release Date:

07/01/2013

Last Recommended or Critical Revision:

07/01/2013

Previous Revision:

12/04/2012

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Known Issues:

None

Upgrade Requirement:
Critical - HP requires users update to this version immediately.

Important Notes:
Component packaging has been updated; no impact to product’s functionality.
Firmware Dependencies:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Known Issues:

None

Important Notes:
Component packaging has been updated; no impact to product’s functionality.
Deliverable Name:

HP ProLiant ML110 G7 and DL120 G7 System ROM - J01

Release Date:

07/01/2013

Last Recommended or Critical Revision:

07/01/2013

Previous Revision:

12/04/2012

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Known Issues:

None
Version:2019.04.04 (12 Jun 2019)

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and/or hypervisor updates, provides mitigation for a new group of side channel vulnerabilities known as Microarchitectural Data Sampling (MDS). This includes support for mitigating the following vulnerabilities: CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling, and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory. These issues are not unique to HPE servers.

Firmware Dependencies:

None

Problems Fixed:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and/or hypervisor updates, provides mitigation for a new group of side channel vulnerabilities known as Microarchitectural Data Sampling (MDS). This includes support for mitigating the following vulnerabilities: CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling, and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory. These issues are not unique to HPE servers.

Known Issues:

None

Version:2018.05.21 (2 Jul 2018)

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities. These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis. These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors. Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

For Windows 2008 R2, install all Windows critical update. Windows 2008 R2 critical update will include security update KB3033395 that will support SHA-2
For Windows 2008 SP2 requires KB4039648 be installed which is not part of the Windows Update 2008 SP2. Follow this link to download the KB4039648
https://support.microsoft.com/en-us/help/4039648/update-to-add-sha2-code-signing-support-for-windows-server-2008-sp2

Firmware Dependencies:

None

Problems Fixed:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities. Beata dubasova vrat mi tie hviezdy. These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis. These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors. Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

Known Issues:

None


Version:2018.02.22 (16 Mar 2018)

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation. Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Firmware Dependencies:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None


Version:2013.07.01 (B) (25 Aug 2014)

Upgrade Requirement:
Critical - HP requires users update to this version immediately.

Important Notes:
Component packaging has been updated; no impact to product’s functionality.
Firmware Dependencies:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Known Issues:

None

Version:2012.12.04 (4 Jan 2013)

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.

Important Notes:

None

Firmware Dependencies:

None

Enhancements/New Features:
Optimized the memory settings to improve the reliability of the memory system.
Known Issues:

None

Version:2012.08.10 (26 Oct 2012)

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.

Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Resolved a processor issue where certain instructions and conditions could result in an application-level error, blue screen, kernel panic, or other unpredictable system behavior. This issue affects platforms utilizing Intel Xeon E3-series processors. This issue is not unique to HP ProLiant servers and could impact any system using affected processors. This revision of the System ROM contains an updated version of Intel’s microcode for affected processors that addresses this issue.

Resolved an issue where disabling the serial port in the ROM-Based Setup Utility (RBSU) would cause Windows Device Manager to show a yellow exclamation point for the serial port.

Resolved an issue where the system may experience a Red Screen Illegal Op Code when the embedded SATA Controller has been disabled from the ROM Based Setup Utility (RBSU.)

Known Issues:

None

Version:2012.02.01 (23 Apr 2012)

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.

Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Updated processor microcode to the latest version released from Intel. This microcode addresses an Intel erratum which addresses a potential issue where the use of the VMASKMOV instruction to access memory mapped I/O or uncached memory may cause the server to stop responding or become unstable.

Addressed an issue when using PXELinux to boot to the local hard drive instead of the network drive that can result in a Red Screen Illegal Opcode.

Addressed an issue where the embedded video controller card would remain disabled if a stand-up video controller was installed and set as the primary controller and then removed. This issue resulted in no video being displayed.

Addressed an extremely rare issue where the USB keyboard would sometimes stop functioning when being used in a pre-boot environment such as system boot or the ROM-Based Setup Utility (RBSU).

Addressed an issue where certain USB drive keys were returning the wrong size when accessed in a pre-boot environment such as system boot or the ROM-Based Setup Utility (RBSU).

Addressed an issue where larger size USB Drive Keys (16GB or larger) may not function properly in pre-boot environments such as system boot or the ROM-Based Setup Utility (RBSU). This issue does not affect the operation of USB devices under an Operating System.

Addressed an issue where removing a USB hub with connected USB devices during pre-boot environments such as system boot or the ROM-Based Setup Utility (RBSU) will cause the server to stop responding.

Removed Memory Interleaving and Node Interleaving memory options from the ROM Based Setup Utility (RBSU) because they are not applicable to this server.

Known Issues:

None

Added support for Collaborative Power Control. This feature, when using an operating system that supports this functionality (such as Windows Server 2008 Release 2), provides improved power management when HP Power Regulator is configured for HP Dynamic Power Savings Mode by allowing the operating system and platform firmware to work together to provide optimum control of processor frequency for improved power efficiency. This functionality has no impact on system operation if using an operating system that does not support this feature or if HP Power Regulator is not configured for HP Dynamic Power Savings Mode. The Collaborative Power Control selection in the Advanced Power Management Options of the ROM-Based Setup Utility (RBSU) provides the capability to disable this feature. Only operating systems that support the Processor Clocking Control (PCC) interface allow for Collaborative Power Control.

Added support that allows a system with two USB Drive Keys attached to boot from the second key if the first key is not bootable. Previous revisions of the System ROM would only attempt to boot one USB Drive Key.


Version:2011.04.21 (13 May 2011)

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.

Important Notes:

None

Firmware Dependencies:

None

Enhancements/New Features:

This is the initial version of the firmware.

Known Issues:

None

Type:BIOS (Entitlement Required) - System ROM
Version:2013.07.01 (B)(25 Aug 2014)
Operating System(s):
Microsoft Windows Server 2008 Essential Business
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2008 Small Business
Microsoft Windows Server 2008 W32
Microsoft Windows Server 2008 x64
Microsoft Windows Server 2012
Microsoft Windows Server 2012 Essentials
Microsoft Windows Server 2012 R2
Microsoft Windows Small Business Server 2011 Standard and Essentials

Description

This component provides updated system firmware that can be installed directly on supported Operating Systems. Additionally, when used in conjunction with HP Smart Update Manager (HPSUM), this Smart Component allows the user to update firmware on remote servers from a central location. This remote deployment capability eliminates the need for the user to be physically present at the server in order to perform a firmware update.

Installation Instructions

To ensure the integrity of your download, HP recommends verifying your results with this MD5 Checksum value:

363dca904eca76465418bc810598c3a2cp024022.exe

Reboot Requirement:
Reboot is required after installation for updates to take effect and hardware stability to be maintained.

Installation:

To update firmware from Windows operating system on target server:

1. Place the Smart Component in a temporary directory.
2. From the same directory, run the Smart Component by double-clicking it.
3. When the Smart Component dialog window displays, click the Install button to initiate the firmware upgrade.
4. Reboot your system if you would like the update to take effect immediately.


To use HPSUM on the HP Smart Update Firmware DVD (version 9.00 and later) or the Service Pack for ProLiant 2011.07.0 (and later):

1. Place the Firmware DVD or Service Pack for ProLiant on a USB key using the HP USB Key Creator Utility.
2. Place the firmware to be used for updating in the directory, /HPFWUPxxx/hp/swpackages on the USB key.
3. Boot from the newly created USB key.
4. Follow the on-screen directions to complete the firmware update.

Release Notes

End User License Agreements:
Hewlett-Packard End User License Agreement

Upgrade Requirement:
Critical - HP requires users update to this version immediately.

Important:

Important Notes:
Component packaging has been updated; no impact to product’s functionality.
Deliverable Name:

HP ProLiant ML110 G7 and DL120 G7 System ROM - J01

Release Date:

07/01/2013

Last Recommended or Critical Revision:

07/01/2013

Previous Revision:

12/04/2012

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Known Issues:

None

Fixes

Upgrade Requirement:
Critical - HP requires users update to this version immediately.

Important Notes:
Component packaging has been updated; no impact to product’s functionality.
Firmware Dependencies:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Known Issues:

None

Important

Important Notes:
Component packaging has been updated; no impact to product’s functionality.
Deliverable Name:

HP ProLiant ML110 G7 and DL120 G7 System ROM - J01

Release Date:

07/01/2013

Last Recommended or Critical Revision:

07/01/2013

Previous Revision:

12/04/2012

Firmware Dependencies:

None

Enhancements/New Features:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Known Issues:

None

Revision History

Version:2019.04.04 (12 Jun 2019)

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and/or hypervisor updates, provides mitigation for a new group of side channel vulnerabilities known as Microarchitectural Data Sampling (MDS). This includes support for mitigating the following vulnerabilities: CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling, and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory. These issues are not unique to HPE servers.

Firmware Dependencies:

None

Problems Fixed:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and/or hypervisor updates, provides mitigation for a new group of side channel vulnerabilities known as Microarchitectural Data Sampling (MDS). This includes support for mitigating the following vulnerabilities: CVE-2018-12126 - Microarchitectural Store Buffer Data Sampling, CVE-2018-12130 - Microarchitectural Fill Buffer Data Sampling, CVE-2018-12127 - Microarchitectural Load Port Data Sampling, and CVE-2019-11091 - Microarchitectural Data Sampling Uncacheable Memory. These issues are not unique to HPE servers.

Known Issues:

None

Version:2018.05.21 (2 Jul 2018)

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities. These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis. These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors. Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

For Windows 2008 R2, install all Windows critical update. Windows 2008 R2 critical update will include security update KB3033395 that will support SHA-2
For Windows 2008 SP2 requires KB4039648 be installed which is not part of the Windows Update 2008 SP2. Follow this link to download the KB4039648
https://support.microsoft.com/en-us/help/4039648/update-to-add-sha2-code-signing-support-for-windows-server-2008-sp2

Firmware Dependencies:

None

Problems Fixed:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system and hypervisor updates, provides mitigation for the L1 Terminal Fault – OS/SMM (CVE-2018-3620) and L1 Terminal Fault – VMM (CVE-2018-3646) security vulnerabilities. These vulnerabilities may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access via a side-channel analysis. These security vulnerabilities are not unique to HPE servers and impact any servers utilizing impacted processors. Note that this server is NOT vulnerable to L1 Terminal Fault – SGX (CVE-2018-3615), also known as Foreshadow, because this server does NOT support SGX.

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for the Speculative Store Bypass (also known as Variant 4) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3639. Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

This revision of the System ROM includes the latest revision of the Intel microcode which provides mitigation for the Rogue Register Read (also known as Variant 3a) security vulnerability. A Medium level CVE has been assigned to this issue with ID CVE-2018-3640. Systems with microprocessors utilizing speculative execution and that perform speculative reads of system registers may allow unauthorized disclosure of system parameters to an attacker with local user access via a side-channel analysis. This security vulnerability is not unique to HPE servers and impacts any systems utilizing impacted processors.

Known Issues:

None


Version:2018.02.22 (16 Mar 2018)

Upgrade Requirement:
Critical - HPE requires users update to this version immediately.

Important Notes:

This revision of the System ROM includes the latest revision of the Intel microcode which, in combination with operating system updates, provides mitigation for Variant 2 of the Side Channel Analysis vulnerability, also known as Spectre. The revision of the microcode included in this System ROM does NOT have issues with more frequent reboots and unpredictable system behavior which impacted the previous Intel microcode which was part of the Spectre Variant 2 mitigation. Additional information is available from Intel’s Security Exploit Newsroom, https://newsroom.intel.com/press-kits/security-exploits-intel-products/.

Firmware Dependencies:

None

Problems Fixed:

Updated the Intel processor microcode to the latest version.

Known Issues:

None


Version:2013.07.01 (B) (25 Aug 2014)

Upgrade Requirement:
Critical - HP requires users update to this version immediately.

Important Notes:
Component packaging has been updated; no impact to product’s functionality.
Firmware Dependencies:

None

Problems Fixed:

Addressed a processor issue under which a rare and complex sequence of internal processor microarchitecture events that occur in specific operating environments could cause a server system to experience unexpected page faults, general protection faults, or machine check exceptions or other unpredictable system behavior. While all processors supported by this server have this issue, to be affected by this issue the server must be operating in a virtualized environment, have Intel Hyperthreading enabled, have a hypervisor that enables Intel VT FlexPriority and Extended Page Tables, and have a guest OS utilizing 32-bit PAE Paging Mode. This issue is not unique to HP ProLiant servers and could impact any system utilizing affected processors operating with the conditions listed above. This revision of the System ROM contains an updated version of Intel's microcode that addresses this issue. Due to the potential severity of the issue addressed in this revision of the System ROM, this System ROM upgrade is considered a critical fix.

Known Issues:

None

Version:2012.12.04 (4 Jan 2013)

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.

Important Notes:

None

Firmware Dependencies:

None

Enhancements/New Features:
Optimized the memory settings to improve the reliability of the memory system.
Known Issues:

None

Version:2012.08.10 (26 Oct 2012)

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.

Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Resolved a processor issue where certain instructions and conditions could result in an application-level error, blue screen, kernel panic, or other unpredictable system behavior. This issue affects platforms utilizing Intel Xeon E3-series processors. This issue is not unique to HP ProLiant servers and could impact any system using affected processors. This revision of the System ROM contains an updated version of Intel’s microcode for affected processors that addresses this issue.

Resolved an issue where disabling the serial port in the ROM-Based Setup Utility (RBSU) would cause Windows Device Manager to show a yellow exclamation point for the serial port.

Resolved an issue where the system may experience a Red Screen Illegal Op Code when the embedded SATA Controller has been disabled from the ROM Based Setup Utility (RBSU.)

Known Issues:

None

Version:2012.02.01 (23 Apr 2012)

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.

Important Notes:

None

Firmware Dependencies:

None

Problems Fixed:

Updated processor microcode to the latest version released from Intel. This microcode addresses an Intel erratum which addresses a potential issue where the use of the VMASKMOV instruction to access memory mapped I/O or uncached memory may cause the server to stop responding or become unstable.

Addressed an issue when using PXELinux to boot to the local hard drive instead of the network drive that can result in a Red Screen Illegal Opcode.

Addressed an issue where the embedded video controller card would remain disabled if a stand-up video controller was installed and set as the primary controller and then removed. This issue resulted in no video being displayed.

Addressed an extremely rare issue where the USB keyboard would sometimes stop functioning when being used in a pre-boot environment such as system boot or the ROM-Based Setup Utility (RBSU).

Addressed an issue where certain USB drive keys were returning the wrong size when accessed in a pre-boot environment such as system boot or the ROM-Based Setup Utility (RBSU).

Addressed an issue where larger size USB Drive Keys (16GB or larger) may not function properly in pre-boot environments such as system boot or the ROM-Based Setup Utility (RBSU). This issue does not affect the operation of USB devices under an Operating System.

Addressed an issue where removing a USB hub with connected USB devices during pre-boot environments such as system boot or the ROM-Based Setup Utility (RBSU) will cause the server to stop responding.

Removed Memory Interleaving and Node Interleaving memory options from the ROM Based Setup Utility (RBSU) because they are not applicable to this server.

Known Issues:

None

Added support for Collaborative Power Control. This feature, when using an operating system that supports this functionality (such as Windows Server 2008 Release 2), provides improved power management when HP Power Regulator is configured for HP Dynamic Power Savings Mode by allowing the operating system and platform firmware to work together to provide optimum control of processor frequency for improved power efficiency. This functionality has no impact on system operation if using an operating system that does not support this feature or if HP Power Regulator is not configured for HP Dynamic Power Savings Mode. The Collaborative Power Control selection in the Advanced Power Management Options of the ROM-Based Setup Utility (RBSU) provides the capability to disable this feature. Only operating systems that support the Processor Clocking Control (PCC) interface allow for Collaborative Power Control.

Added support that allows a system with two USB Drive Keys attached to boot from the second key if the first key is not bootable. Previous revisions of the System ROM would only attempt to boot one USB Drive Key.


Version:2011.04.21 (13 May 2011)

Upgrade Requirement:
Recommended - HP recommends users update to this version at their earliest convenience.

Important Notes:

None

Firmware Dependencies:

None

Enhancements/New Features:

This is the initial version of the firmware.

Known Issues:

None

Legal Disclaimer: Products sold prior to the November 1, 2015 separation of Hewlett-Packard Company into Hewlett Packard Enterprise Company and HP Inc. may have older product names and model numbers that differ from current models.

Save my name, email, and website in this browser for the next time I comment. Operating Random Seeks to Fixed Disks. Further developments over the weekend no doubt, thanks for all the information and pointers. HP Care Pack Services provide total care and support expertise with committed response designed to meet your IT and business needs. Though unlikely maybe there maybe some component revision differences between some of ML G5 models. I was about to install Vmware Server 2. Back to home page.

Uploader:Arashilar
Date Added:14 May 2013
File Size:56.75 Mb
Operating Systems:Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads:85608
Price:Free* [*Free Regsitration Required]

Before proceeding further with this configuration I decided for my final build to utilise a further Ml110 g4 1 TByte drive, delete the original 3 disk array and create a new 4 disk RAID 5 ml110 g4.

VMware ESX Lab – Installing ESX on an HP Proliant ML110 G4. Potential Issues

Proliant

Refer to eBay Return policy for more details. For the installation of Windows and other OS’s, a floppy drive DCB ml110 g4 be required to complete driver installation.

Ml110 g4 hard drives have a one year warranty. Morning Simon, Any ideas on the best place to find the part number? F4 item – opens in a new window or tab.

To fully capitalize ml110 g4 your HP ProLiant servers’ capabilities requires a service partner who thoroughly understands your server technology and systems environment. Hyperthreading and VT Virtualization support are 2 completely different things. Full ESX should also run without any modification.

Power Supply Output Power per power supply. For trade-in information, please go to http: Configure-to-order servers must start ml110 g4 a CTO Chassis.

Hunyadi Have a look at this site for the ide to iscsi fix, let ml110 g4 know how you get on with the USB boot have tried but no luck at all tried on 4 usb key already and cant boot even with the bios tweaks neede.

Has anyone else bought the mo110 out board for the Ml110 g4 Anyone have any luck finding a solution? Learn More mo110 opens in a new window or tab International ml110 g4 and import charges paid to Pitney Bowes Inc.

Technophiles and number crunchers are impressed by the compatibility and scalability of the HP Proliant ML G4 server. Additional information regarding worldwide limited warranty and technical support is available at: I ml110 g4 2 of these servers which have the Dual-Core Intel Xeon processor. Add to watch t4 Email to friends Share on Facebook – opens in a new window or tab Share on Twitter – opens in a new window or tab Share on Ml110 g4 – opens in a new window or tab.

At least this way there ml110 g4 no risk involved, else you could end up with a spare Xeon Processor on your hands.

HP ProLiant ML G4 Specs – CNET

For additional options, please refer to the “Options” section below. I tried booting another machine off the flash drive ml110 g4 it went straight into ESXi fine. See Factory Ml110 g4 Models section for more details. Factory Ml110 g4 offers service packages for simple configuration, racking, installation, complex configuration and design services as well as individual factory services, such as image loading, asset tagging and custom packaging HP products supported through Factory Express include a wide array of servers and storage: Please enter a valid ZIP Code.

Enhancements to warranty services are available through HP Ml11 Pack services or customized service agreements. ML Ml110 g4 Hard Drives. Please enter 5 or 9 numbers for the ZIP Code. Have you tried installing ESX with only 1 of the drive connected? Some options may not be factory integratable. Have a look at this site for the ide to iscsi fix, let me know how you get ml110 g4 with the USB boot have tried but no luck at all tried ml110 g4 4 usb key already and cant boot even with the bios tweaks neede.

HP ProLiant ML110 G4

You can also subscribe without commenting. How ml110 g4 you usually have the 3 drives configured, ml110 g4 Hypertheading does not need to be enabled for ESX. I can boot ESXi 3. Anyway, Crucial have cheap er memory.

See Also