AH780
For Impact, Severity and other Firmware definitions, Please
refer to the below 'Glossary of firmware terms' url:
http://www14.software.ibm.com/webapp/set2/sas/f/power5cm/home.html#termdefs
The following Fix description table will
only contain the N (current) and N-1 (previous) levels.
The complete Firmware Fix History for this
Release Level can be
reviewed at the following url:
http://download.boulder.ibm.com/ibmdl/pub/software/server/firmware/AH-Firmware-Hist.html
|
AH780_091_040 / FW780.80
12/13/17 |
Impact: Availability
Severity: SPE
System firmware changes that affect all systems
- A problem was fixed for an intermittent core dump of
netsCommonMsgServer on the service processor with a serviceable callout
for SRC B181EF88. This problem can be triggered by brief network
outages that cause the HMC to disconnect and reconnect to the service
processor, causing race conditions in the HMC session shutdowns.
- A problem was fixed for an invalid date from the service
processor causing the customer date and time to go to the Epoch value
(01/01/1970) without a warning or chance for a correction. With
the fix, the first IPL attempted on an invalid date will be
rejected with a message alerting the user to set the time correctly in
the service processor. If the warning is ignored and the
date/time is not corrected, the next IPL attempt will complete to the
OS with the time reverted to the Epoch time and date. This
problem is very rare but it has been known to occur on service
processor replacements when the repair step to set the date and time on
the new service processor was inadvertently skipped by the service
representative.
- A problem was fixed for incorrect low affinity scores
for a partition reported from the HMC "lsmemopt" command when a
partition has filled an entire drawer. A low score indicates the
placement is poor but in this case the placement is actually
good. More information on affinity scores for partitions and the
Dynamic Platform Optimizer can be found at the IBM Knowledge Center: https://www.ibm.com/support/knowledgecenter/en/9119-MME/p8hat/p8hat_dpoovw.htm.
- A problem was fixed for spurious loggings of SRCs A7004715
and A7001730 for system VPD errors that did not reflect actual problems
in the system Vital Product Data (VPD) card. With the fix,
the VPD card SRCs are now reported only after a certain error
threshold is achieved to ensure that replacement of the VPD card will
help resolve the VPD problems.
- A problem was fixed for the Advanced System Management
Interface (ASMI) that prevented a HMC using the enhanced GUI from
connecting to the power frame Bulk Power Controller (BPC) service
processor's ASMI. An Internal Server Error message would result
for the ASMI login panel. This error was introduced in ASMI in
FW780.20 and only happens for a HMC running in enhanced GUI mode that
is at V8R8.5.0 SP3 or later levels. The circumvention is to
use the failing HMC in classic GUI mode, if possible, or for HMC level
V8R8.7.0 (which only has the enhanced GUI mode) to have HMC PTF MH01706
installed.
System firmware changes that affect certain systems
- On systems with mirrored memory running IBM i partitions, a
problem was fixed for memory fails in the partition that also caused
the system to crash. The system failure will occur any time that
IBM i partition memory towards the beginning of the partition's
assigned memory fails. With the fix, the memory failure is
isolated to the impacted partition, leaving the rest of the system
unaffected.
- A problem was fixed for a Power Enterprise Pool (PEP)
system losing its assigned processor and memory resources after an IPL
of the system. This is an intermittent problem caused by a small
timing window that makes it possible for the server to not get the
IPL-time assignment of resources from the HMC. If this problem
occurs, it can be corrected by the HMC to recover the pool without
needing another IPL of the system.
|
AH780_089_040 / FW780.70
07/26/17 |
Impact: Availability
Severity: ATT
New features and functions
- Support for the Advanced System Management Interface (ASMI)
was changed to allow the special characters of "I", "O", and "Q" to be
entered for the serial number of the I/O Enclosure under the Configure
I/O Enclosure option. These characters have only been found in an
IBM serial number rarely, so typing in these characters will normally
be an incorrect action. However, the special character entry is
not blocked by ASMI anymore so it is able to support the exception
case. Without the enhancement, the typing of one of the special
characters causes message "Invalid serial number" to be displayed.
- Support for firmware updates using USB was
enabled. Without the change, entitlement checks prevent the
USB code update from running on systems with FW780.
- Support was added for the Universally Unique
IDentifier (UUID) property for each partition. The UUID provides
each partition with an identifier that is persisted by the platform
across partition reboots, reconfigurations, OS reinstalls, partition
migration, and hibernation.
System firmware changes that affect all systems
- A problem was fixed for a partition boot fail or hang
from a Fibre Channel device having fabric faults. Some of the
fabric errors returned by the VIOS are not interpreted correctly by the
Open Firmware VFC drive, causing the hang instead of generating helpful
error logs.
- A problem was fixed for an SRC BA090006 serviceable event
log occurring whenever an attempt was made to boot from an ALUA
(Asymmetric Logical Unit Access) drive. These drives are always
busy by design and cannot be used for a partition boot, but no service
action is required if a user inadvertently tries to do that.
Therefore, the SRC was changed to be an informational log.
- A problem was fixed for a Power Enterprise Pool (PEP)
resource Grace Period not being reset when the server is in the "Out of
Compliance" state and the resource has been returned to put the server
back in Compliance. The Grace Period was not being reset after a
double-commit of a resource (doing an "remove" of an active resource)
was resolved by restarting the server with the double-committed
resource. When Grace Period ends, the "double-committed" resources on
the server have to have been freed up from use to prevent the server
from going to "Out of Compliance". If the user fails to free up
the resource, the PEP is in an "Out of Compliance" state, and the only
PEP actions allowed are ones to free up the double-commit. Once that is
completed, the PEP is back In Compliance. The loss of the Grace Period
for the error makes it difficult to move resources around in the
PEP. Without the fix, the user can "Add" another PEP
resource to the server, and the action of adding a PEP resource resets
the Grace Period timer. One could then "Remove" that one PEP
resource just added, and then any further "removes" of PEP resources
would behave as expected with the full Grace Period in effect.
- A problem was fixed for Power Enterprise Pool (PEP)
IFL processors assignments causing an "Out of Compliance" for normal
processor licenses. The number of IFL processors purchased was
first credited as satisfying any "unreturned" PEP processor resources,
thus potentially leaving the system "Out Of Compliance" since IFL
processors should not be taking the place of the normal (expensive)
processor usage. In this situation, without the fix, the user
will need to either purchase more "expensive" non-IFL processors to
satisfy the non-IFL workloads or adjust the partitions to reduce the
usage of non-IFL processors. This is a very infrequent problem
for the following reasons:
1) PEP processors are infrequently left "unreturned" for short periods
of time for specialized operations such as LPM migrations
2) The user would have to purchase IFL processors from IBM, which is
not a common occurrence.
3) The user would have to put in a COD key for IFL processors while a
PEP processor is still "unreturned".
- A problem was fixed for a Power Enterprise Pool (PEP)
resource Grace Period being short by one hour with 71 hours provided
instead of 72. The Grace Period is provided when all PEP
resources are assigned and the user double-uses these resources
(typically this is done for a Live Partition Mobility (LPM)
migration). This "borrowing" is temporarily permitted in this
case even if there are not enough licenses to cover resources in both
servers. The PEP goes into "Approaching Out Of Compliance", indicating
the user has a certain amount of time to resolve this double-use. The
problem here is that the time length of this Grace Period lasts one
hour less than stated. For a 72-hour Grace Period (the standard
setting), the user only gets 71 hours. The user sees "71 hours
remaining" (correct) on first display at start, then right away,
if the user displays again, 70 hours is shown remaining. But
thereafter, the Grace Period time decrements correctly for the time
remaining.
- A problem was fixed for Power Enterprise Pool (PEP)
non-applicable error messages being displayed when re-entering PEP XML
files for PEP updates, in which one of the XML operations calls for
Conversion of Perm Resources to PEP Resources. There is no error
as the PEP key was accepted on the first use. The following
message may be seen on the HMC and can be ignored:
"...HSCL0520 A Mobile CoD processor conversion code to convert 0
permanently activated processors to Mobile CoD processors on the
managed system has been entered. HSCL050F This CoD code is not
valid for your managed system. Contact your CoD administrator."
System firmware changes that affect certain systems
- On systems with IBM i partitions, a problem was fixed for
frequent logging of informational B7005120 errors due to communications
path closed conditions during messaging from HMCs to IBM i
partitions. In the majority of cases these errors are due to
normal operating conditions and not due to errors that require service
or attention. The logging of informational errors due to this
specific communications path closed condition that are the result of
normal operating conditions has been removed.
|
AH780_084_040 / FW780.60
01/16/17 |
Impact: Availability
Severity: SPE
|
AH780_080_040 / FW780.50
06/29/16 |
Only Deferred fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Availability
Severity: SPE
Concurrent hot add/repair
maintenance (CHARM) firmware fixes
- DEFERRED: A
problem was fixed for a I/O performance slow-down that can occur after
a concurrent repair of a GX bus I/O adapter with a Feature Code of
#1808, #1816, #1914, #EN22, #EN23, or #EN25. A re-IPL of the
system after the concurrent repair operation corrects the I/O
performance issue. This fix requires an IPL of the system to take
effect.
|
AH780_075_040 / FW780.40
12/16/15 |
Impact: Availability
Severity: SPE |
AH780_071_040 / FW780.30
04/22/15 |
Impact: Security
Severity: SPE |
AH780_068_040 / FW780.21
01/07/15 |
Only HIPER fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Security
Severity: HIPER
System firmware changes that affect certain systems
- HIPER/Pervasive:
On systems using PowerVM firmware, a performance problem was fixed that
may affect shared processor partitions where there is a mixture of
dedicated and shared processor partitions with virtual IO connections,
such as virtual ethernet or Virtual IO Server (VIOS) hosting, between
them. In high availability cluster environments this problem may
result in a split brain scenario.
|
AH780_066_040 / FW780.20
10/16/14 |
Only HIPER fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Data
Severity: HIPER
System firmware changes that affect certain systems
- HIPER/Pervasive:
A problem was fixed in PowerVM where the effect of the problem is
non-deterministic but may include an undetected corruption of data,
although IBM test has not been able to make this condition occur. This
problem is only possible if VIOS (Virtual I/O Server) version 2.2.3.x
or later is installed and the following statement is true: A
Shared Ethernet Adapter (SEA) with fail over enabled is configured on
the VIOS.
|
AH780_059_040 / FW780.11
06/23/14 |
Only HIPER fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Security
Severity: HIPER
System firmware changes that affect all systems
- HIPER/Pervasive:
A security problem was fixed in the OpenSSL (Secure Socket Layer)
protocol that allowed clients and servers, via a specially crafted
handshake packet, to use weak keying material for communication.
A man-in-the-middle attacker could use this flaw to decrypt and modify
traffic between the management console and the service processor.
The Common Vulnerabilities and Exposures issue number for this problem
is CVE-2014-0224.
- HIPER/Pervasive:
A security problem was fixed in OpenSSL for a buffer overflow in the
Datagram Transport Layer Security (DTLS) when handling invalid DTLS
packet fragments. This could be used to execute arbitrary code on
the service processor. The Common Vulnerabilities and Exposures
issue number for this problem is CVE-2014-0195.
- HIPER/Pervasive:
Multiple security problems were fixed in the way that OpenSSL handled
read and write buffers when the SSL_MODE_RELEASE_BUFFERS mode was
enabled to prevent denial of service. These could cause the
service processor to reset or unexpectedly drop connections to the
management console when processing certain SSL commands. The
Common Vulnerabilities and Exposures issue numbers for these problems
are CVE-2010-5298 and CVE-2014-0198.
- HIPER/Pervasive:
A security problem was fixed in OpenSSL to prevent a denial of service
when handling certain Datagram Transport Layer Security (DTLS)
ServerHello requests. A specially crafted DTLS handshake packet could
cause the service processor to reset. The Common Vulnerabilities
and Exposures issue number for this problem is CVE-2014-0221.
- HIPER/Pervasive:
A security problem was fixed in OpenSSL to prevent a denial of service
by using an exploit of a null pointer de-reference during anonymous
Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially
crafted handshake packet could cause the service processor to
reset. The Common Vulnerabilities and Exposures issue number for
this problem is CVE-2014-3470.
|
AH780_056_040 / FW780.10
04/25/14 |
Impact: Serviceability
Severity: SPE |
AH780_054_040 / FW780.02
04/18/14 |
Only HIPER fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Security
Severity: HIPER
System firmware changes that affect all systems
- HIPER/Pervasive:
A security problem was fixed in the OpenSSL Montgomery ladder
implementation for the ECDSA (Elliptic Curve Digital Signature
Algorithm) to protect sensitive information from being obtained with a
flush and reload cache side-channel attack to recover ECDSA nonces from
the service processor. The Common Vulnerabilities and Exposures
issue number is CVE-2014-0076. The stolen ECDSA nonces could be
used to decrypt the SSL sessions and compromise the Hardware Management
Console (HMC) access password to the service processor.
Therefore, the HMC access password for the managed system should be
changed after applying this fix.
- HIPER/Pervasive:
A security problem was fixed in the OpenSSL Transport Layer
Security (TLS) and Datagram Transport Layer Security (DTLS) to not
allow Heartbeat Extension packets to trigger a buffer over-read to
steal private keys for the encrypted sessions on the service
processor. The Common Vulnerabilities and Exposures issue number
is CVE-2014-0160 and it is also known as the heartbleed
vulnerability. The stolen private keys could be used to decrypt
the SSL sessions and and compromise the Hardware Management Console
(HMC) access password to the service processor. Therefore, the
HMC access password for the managed system should be changed after
applying this fix.
|
AH780_050_040 / FW780.01
03/10/14 |
Only HIPER fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Data
Severity: HIPER
System firmware changes that affect all systems
- HIPER/Non-Pervasive:
A problem was fixed for a potential silent data corruption issue that
may occur when a Live Partition Mobility (LPM) operation is performed
from a system (source system) running a firmware level earlier than
AH780_040 or AM780_040 to a system (target system) running AH780_040 or
AM780_040.
|
AH780_040_040 / FW780.00
12/06/13 |
Impact:
New
Severity: New |