Power7 System Firmware
Applies to: 8412-EAD; 9117-MMB; 9117-MMD; 9179-MHB and 9179-MHD
This document provides information about the installation of
Licensed
Machine or Licensed Internal Code, which is sometimes referred to
generically
as microcode or firmware.
Contents
1.0
Systems Affected
This package provides firmware for Power 770 (9117-MMB, 9117-MMD)
and Power
780 (8412-EAD, 9179-MHB, 9179-MHD) servers
only.
The firmware level in this package is:
1.1 Minimum HMC Code Level
This section is intended to describe the "Minimum HMC Code Level"
required by the System Firmware to complete the firmware installation
process. When installing the System Firmware, the HMC level must be
equal to or higher than the "Minimum HMC Code Level" before starting
the system firmware update. If the HMC managing the server
targeted for the System Firmware update is running a code level lower
than the "Minimum HMC
Code Level" the firmware update will not proceed.
The
Minimum HMC Code level for
this firmware is: HMC V7 R7.9.0
(PTF MH01405) with mandatory efix (PTF MH01406).
Although
the Minimum HMC Code level for this firmware is listed
above, HMC V7 R7.9.0
Service Pack 3
(PTF MH01546) with ifix (PTF
MH01699) or higher is
recommended.
Important: To avoid vulnerability to security or known HMC issues
, the HMC
should be updated to the above recommended level, prior to
installing this server firmware
level.
Notes:
- V7 R790 SP3
: HMC V7.R790 is the
last HMC release to support HMC Models CR4, CR3, C07, C06, C05
- Upgrading the HMC to
V7R7.9.0 is required prior to installing
this firmware. This is due to the firmware containing support for
Single Root I/O Virtualization (SR-IOV) adapters. An SR-IOV adapter can
be configured in shared mode and be shared by multiple logic partitions
at the same time. HMC supports the configuration of the logical ports
assigned to partitions and supports the configuration, backup, and
restore of the adapter and physical port properties.
For
information
concerning HMC releases and the latest PTFs,
go
to the following URL to access Fix Central.
http://www-933.ibm.com/support/fixcentral/
For specific fix level
information on key components of IBM
Power Systems running the AIX, IBM i and Linux operating systems, we
suggest using the Fix Level Recommendation Tool (FLRT):
http://www14.software.ibm.com/webapp/set2/flrt/home
NOTE: You must be logged in as hscroot in order for the
firmware
installation to complete correctly.
2.0 Important
Information
Downgrading firmware from any
given release level to an earlier release level is not recommended.
If you feel that it is
necessary to downgrade the firmware on
your system to an earlier release level, please contact your next level
of support.
Concurrent Firmware Updates
Concurrent system firmware update is only supported on HMC
Managed
Systems
only.
Memory Considerations for Firmware Upgrades
Firmware Release Level upgrades and Service Pack updates may consume
additional system memory.
Server firmware requires memory to support the logical partitions on
the server. The amount of memory required by the server firmware varies
according to several factors.
Factors influencing server firmware memory requirements include the
following:
- Number of logical partitions
- Partition environments of the logical
partitions
- Number of physical and virtual I/O devices
used by the logical partitions
- Maximum memory values given to the logical
partitions
Generally, you can estimate the amount of memory required by server
firmware to be approximately 8% of the system installed memory. The
actual amount required will generally be less than 8%. However, there
are some server models that require an absolute minimum amount of
memory for server firmware, regardless of the previously mentioned
considerations.
Additional information can be found at:
https://www.ibm.com/support/knowledgecenter/9117-MMD/p7hat/iphatlparmemory.htm
3.0 Firmware
Information
and Description
Use the following examples as a reference to determine whether your
installation
will be concurrent or disruptive.
For systems that are not managed by an HMC, the installation
of
system
firmware is always disruptive.
Note: The concurrent levels
of system firmware may, on occasion,
contain
fixes that are known as Deferred and/or Partition-Deferred. Deferred
fixes can be installed
concurrently, but will not be activated until the next IPL.
Partition-Deferred fixes can be installed concurrently, but will not be
activated until a partition reactivate is performed. Deferred
and/or Partition-Deferred
fixes,
if any, will be identified in the "Firmware Update Descriptions" table
of this document. For these types of fixes (Deferred and/or
Partition-Deferred) within a service pack, only the
fixes
in the service pack which cannot be concurrently activated are
deferred.
Note: The file names and service pack levels used in the
following
examples are for clarification only, and are not
necessarily levels that have been, or will be released.
System firmware file naming convention:
01AMXXX_YYY_ZZZ
- XXX is the release level
- YYY is the service pack level
- ZZZ is the last disruptive service pack level
NOTE: Values of service pack and last disruptive service pack
level
(YYY and ZZZ) are only unique within a release level (XXX). For
example,
01AM720_067_045 and 01AM740_067_053 are different service
packs.
An installation is disruptive if:
- The release levels (XXX) are different.
Example: Currently installed release is AM710, new release is AM720
- The service pack level (YYY) and the last disruptive
service
pack level (ZZZ) are the same.
Example: AM720_120_120 is disruptive, no matter what level of AM720 is
currently
installed on the system
- The service pack level (YYY) currently installed on the
system
is
lower than the last disruptive service pack level (ZZZ) of the service
pack to be installed.
Example: Currently installed service pack is AM720_120_120 and new
service
pack is AM720_152_130
An installation is concurrent if:
The release level (XXX) is the same, and
The service pack level (YYY) currently installed on the system
is the same or higher than the last disruptive service pack level (ZZZ)
of the service pack to be installed.
Example: Currently installed service pack is AM720_126_120,
new
service pack is AM720_143_120.
Firmware Information and Update Description
Filename |
Size |
Checksum |
md5sum |
01AM780_096_040.rpm |
46138719
|
38052
|
477285355b167cfc533009dc258b45ac
|
Note: The Checksum can be found by running the AIX sum
command against
the rpm file (only the first 5 digits are listed).
ie: sum 01AM780_096_040.rpm
AM780
For Impact, Severity and other Firmware definitions, Please
refer to the below 'Glossary of firmware terms' url:
http://www14.software.ibm.com/webapp/set2/sas/f/power5cm/home.html#termdefs
The following Fix description table will
only contain the N (current) and N-1 (previous) levels.
The complete Firmware Fix History for this
Release Level can be
reviewed at the following url:
http://download.boulder.ibm.com/ibmdl/pub/software/server/firmware/AM-Firmware-Hist.html
|
AM780_096_040 / FW780.82
01/31/18 |
Systems
8412-EAD; 9117-MMB; 9117-MMD; 9179-MHB and 9179-MHD
Impact: Security
Severity: SPE
Response for Recent Security
Vulnerabilities
- In response to recently reported security vulnerabilities,
this firmware update is being released to address Common
Vulnerabilities and Exposures issue number CVE-2017-5715. In
addition, Operating System updates are available to mitigate the
CVE-2017-5753 and CVE-2017-5754 security issues. This pertains to the
following models:
1) IBM Power 770 (9117-MMB)
2) IBM Power 780 (9179-MHB)
This firmware update also addresses CVE-2017-5715 for IBM i, along with
updates for AIX and Linux, for the following models:
1) IBM Power 770 (9117-MMD)
2) IBM Power 780 (9179-MHD)
3) IBM Power ESE (8412-EAD)
|
AM780_094_040 / FW780.81
01/09/18 |
Systems
8412-EAD; 9117-MMD; and 9179-MHD ONLY
Impact: Security
Severity: SPE
New features and functions
- In response to recently reported security vulnerabilities,
this firmware update is being released to address Common
Vulnerabilities and Exposures issue numbers CVE-2017-5715,
CVE-2017-5753 and CVE-2017-5754. Note that a subsequent FW
release is required and will replace this FW update for CVE-2017-5715
for IBMi when available. In addition, Operating System updates are
required in conjunction with this FW level for CVE-2017-5753 and
CVE-2017-5754.
The models addressed by this service pack update have the P7+
processor:
1) IBM Power 770 (9117-MMD)
2) IBM Power 780 (9179-MHD)
3) IBM Power ESE (8412-EAD)
|
AM780_091_040 / FW780.80
12/13/17 |
Impact: Availability
Severity: SPE |
AM780_089_040 / FW780.70
07/26/17 |
Impact: Availability
Severity: ATT |
AM780_084_040 / FW780.60
01/16/17 |
Impact: Availability
Severity: SPE |
AM780_080_040 / FW780.50
06/29/16 |
Only Deferred fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Availability
Severity: SPE
Concurrent hot add/repair
maintenance (CHARM) firmware fixes
- DEFERRED: A
problem was fixed for a I/O performance slow-down that can occur after
a concurrent repair of a GX bus I/O adapter with a Feature Code of
#1808, #1816, #1914, #EN22, #EN23, or #EN25. A re-IPL of the
system after the concurrent repair operation corrects the I/O
performance issue. This fix requires an IPL of the system to take
effect.
|
AM780_075_040 / FW780.40
12/16/15 |
Impact: Availability
Severity: SPE |
AM780_071_040 / FW780.30
04/22/15 |
Impact: Security
Severity: SPE |
AM780_068_040 / FW780.21
01/07/15 |
Only HIPER fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Security
Severity: HIPER
System firmware changes that affect certain systems
- HIPER/Pervasive:
On systems using PowerVM firmware, a performance problem was fixed that
may affect shared processor partitions where there is a mixture of
dedicated and shared processor partitions with virtual IO connections,
such as virtual ethernet or Virtual IO Server (VIOS) hosting, between
them. In high availability cluster environments this problem may
result in a split brain scenario.
- On systems with redundant service processors, a
problem was fixed so that a backup memory clock failure with SRC
B120CC62 is handled without terminating the system running on the
primary memory clock.
|
AM780_066_040 / FW780.20
10/16/14 |
Only HIPER fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Data
Severity: HIPER
System firmware changes that affect certain systems
- HIPER/Pervasive:
A problem was fixed in PowerVM where the effect of the problem is
non-deterministic but may include an undetected corruption of data,
although IBM test has not been able to make this condition occur. This
problem is only possible if VIOS (Virtual I/O Server) version 2.2.3.x
or later is installed and the following statement is true: A
Shared Ethernet Adapter (SEA) with fail over enabled is configured on
the VIOS.
|
AM780_059_040 / FW780.11
06/23/14 |
Only HIPER fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Security
Severity: HIPER
System firmware changes that affect all systems
- HIPER/Pervasive: A security
problem was fixed in the OpenSSL (Secure Socket Layer) protocol that
allowed clients and servers, via a specially crafted handshake packet,
to use weak keying material for communication. A
man-in-the-middle attacker could use this flaw to decrypt and modify
traffic between the management console and the service processor.
The Common Vulnerabilities and Exposures issue number for this problem
is CVE-2014-0224.
- HIPER/Pervasive:
A security problem was fixed in OpenSSL for a buffer overflow in the
Datagram Transport Layer Security (DTLS) when handling invalid DTLS
packet fragments. This could be used to execute arbitrary code on
the service processor. The Common Vulnerabilities and Exposures
issue number for this problem is CVE-2014-0195.
- HIPER/Pervasive:
Multiple security problems were fixed in the way that OpenSSL handled
read and write buffers when the SSL_MODE_RELEASE_BUFFERS mode was
enabled to prevent denial of service. These could cause the
service processor to reset or unexpectedly drop connections to the
management console when processing certain SSL commands. The
Common Vulnerabilities and Exposures issue numbers for these problems
are CVE-2010-5298 and CVE-2014-0198.
- HIPER/Pervasive:
A security problem was fixed in OpenSSL to prevent a denial of service
when handling certain Datagram Transport Layer Security (DTLS)
ServerHello requests. A specially crafted DTLS handshake packet could
cause the service processor to reset. The Common Vulnerabilities
and Exposures issue number for this problem is CVE-2014-0221.
- HIPER/Pervasive:
A security problem was fixed in OpenSSL to prevent a denial of service
by using an exploit of a null pointer de-reference during anonymous
Elliptic Curve Diffie Hellman (ECDH) key exchange. A specially
crafted handshake packet could cause the service processor to
reset. The Common Vulnerabilities and Exposures issue number for
this problem is CVE-2014-3470.
|
AM780_056_040 / FW780.10
04/25/14 |
Only Deferred fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Serviceability
Severity: SPE
System firmware changes that affect certain systems
- DEFERRED: On
systems with a redundant service processor, a problem was fixed that
caused a system termination with SRC B158CC62 during a clock failover
initiated by certain types of clock card failures. This deferred
fix addresses a problem that has a very low probability of
occurrence. As such customers may wait for the next planned
service window to activate the deferred fix via a system reboot.
This problem does not pertain to IBM Power 770 (9117-MMB) and IBM Power
780 (9179-MHB) systems.
|
AM780_054_040 / FW780.02
04/18/14 |
Only HIPER fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Security
Severity: HIPER
System firmware changes that affect all systems
- HIPER/Pervasive:
A security problem was fixed in the OpenSSL Montgomery ladder
implementation for the ECDSA (Elliptic Curve Digital Signature
Algorithm) to protect sensitive information from being obtained with a
flush and reload cache side-channel attack to recover ECDSA nonces from
the service processor. The Common Vulnerabilities and Exposures
issue number is CVE-2014-0076. The stolen ECDSA nonces could be
used to decrypt the SSL sessions and compromise the Hardware Management
Console (HMC) access password to the service processor.
Therefore, the HMC access password for the managed system should be
changed after applying this fix.
- HIPER/Pervasive:
A security problem was fixed in the OpenSSL Transport Layer
Security (TLS) and Datagram Transport Layer Security (DTLS) to not
allow Heartbeat Extension packets to trigger a buffer over-read to
steal private keys for the encrypted sessions on the service
processor. The Common Vulnerabilities and Exposures issue number
is CVE-2014-0160 and it is also known as the heartbleed
vulnerability. The stolen private keys could be used to decrypt
the SSL sessions and and compromise the Hardware Management Console
(HMC) access password to the service processor. Therefore, the
HMC access password for the managed system should be changed after
applying this fix.
|
AM780_050_040 / FW780.01
03/10/14 |
Only HIPER fix descriptions
are
displayed for this service pack.
The complete Firmware Fix
History for this Release Level can be
reviewed at the following url:
Impact: Data
Severity: HIPER
System firmware changes that affect all systems
- HIPER/Non-Pervasive:
A problem was fixed for a potential silent data corruption issue that
may occur when a Live Partition Mobility (LPM) operation is performed
from a system (source system) running a firmware level earlier than
AH780_040 or AM780_040 to a system (target system) running AH780_040 or
AM780_040.
|
AM780_040_040 / FW780.00
12/06/13 |
Impact:
New
Severity: New |
4.0
How to Determine Currently Installed Firmware Level
For HMC managed systems:
From the HMC, select Updates in the navigation (left-hand) pane, then
view the current levels of the desired server(s).
Alternately,
use the Advanced System
Management Interface (ASMI) Welcome pane. The current server
firmware appears in the top right
corner.
Example: AM780_yyy.
5.0
Downloading the Firmware Package
Follow the instructions on Fix Central. You must read and agree to
the
license agreement to obtain the firmware packages.
Note: If your HMC is not internet-connected you will need
to
download
the new firmware level to a CD-ROM or ftp server.
6.0 Installing the
Firmware
The method used to install new firmware will depend on the release
level
of firmware which is currently installed on your server. The release
level
can be determined by the prefix of the new firmware's filename.
Example: AMXXX_YYY_ZZZ
Where XXX = release level
- If the release level will stay the same (Example: Level
AM710_075_075
is
currently installed and you are attempting to install level
AM710_081_075)
this is considered an update.
- If the release level will change (Example: Level AM710_081_075 is
currently
installed and you are attempting to install level AM720_097_096) this
is
considered an upgrade.
HMC Managed Systems:
Instructions for installing firmware updates and upgrades on
systems
managed by an HMC can be found at:
https://www.ibm.com/support/knowledgecenter/9117-MMD/p7ha1/updupdates.htm
Systems not Managed by an HMC:
Power Systems:
Instructions for installing firmware on systems that are not
managed
by an HMC can be found at:
https://www.ibm.com/support/knowledgecenter/9117-MMD/p7ha5/fix_serv_firm_kick.htm
IBM i Systems:
See "IBM Server Firmware and HMC Code Wizards":
http://www-912.ibm.com/s_dir/slkbase.NSF/DocNumber/408316083
NOTE:
For all systems running with
the IBM i Operating System, the following IBM i PTFs must be applied to
all IBM i partitions prior to installing AM780_096:
- V7R1M0 - MF51869
- V6R1M1 - MF51864
These PTFs can be ordered through Fix Central.
When ordering firmware for IBM i Operating System managed systems from
Fix Central,
choose "Select product", under Product Group specify
"System i", under Product specify "IBM i", then Continue and specify
the desired firmware PTF accordingly.
7.0 Firmware History
The complete Firmware Fix History (including HIPER descriptions) for
this Release Level can be
reviewed at the following url:
http://download.boulder.ibm.com/ibmdl/pub/software/server/firmware/AM-Firmware-Hist.html
8.0
Change History
Date
|
Description
|
February 23, 2018 |
Fix Description update for
AM780_096 / FW780.82.
|