1 5MB FW Release Notes 7 1 52 1176 HF
1 5MB FW Release Notes 7 1 52 1176 HF
1 5MB FW Release Notes 7 1 52 1176 HF
6 Series/X79 Express
Chipset -
Intel
Management Engine
Firmware 7.1
1.5MB Firmware Release Notes
7.1.52.1176 Hot Fix (HF) Release
June 2012
Intel Confidential
2 Intel Confidential
INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED,
BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS
PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER
AND INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF INTEL PRODUCTS
INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR
INFRINGEMENT OF ANY PATENT, COPYRIGHT OR OTHER INTELLECTUAL PROPERTY RIGHT.
A "Mission Critical Application" is any application in which failure of the Intel Product could result, directly or indirectly, in
personal injury or death. SHOULD YOU PURCHASE OR USE INTEL'S PRODUCTS FOR ANY SUCH MISSION CRITICAL APPLICATION,
YOU SHALL INDEMNIFY AND HOLD INTEL AND ITS SUBSIDIARIES, SUBCONTRACTORS AND AFFILIATES, AND THE DIRECTORS,
OFFICERS, AND EMPLOYEES OF EACH, HARMLESS AGAINST ALL CLAIMS COSTS, DAMAGES, AND EXPENSES AND REASONABLE
ATTORNEYS' FEES ARISING OUT OF, DIRECTLY OR INDIRECTLY, ANY CLAIM OF PRODUCT LIABILITY, PERSONAL INJURY, OR
DEATH ARISING IN ANY WAY OUT OF SUCH MISSION CRITICAL APPLICATION, WHETHER OR NOT INTEL OR ITS
SUBCONTRACTOR WAS NEGLIGENT IN THE DESIGN, MANUFACTURE, OR WARNING OF THE INTEL PRODUCT OR ANY OF ITS
PARTS.
Intel may make changes to specifications and product descriptions at any time, without notice. Designers must not rely on the
absence or characteristics of any features or instructions marked "reserved" or "undefined". Intel reserves these for future
definition and shall have no responsibility whatsoever for conflicts or incompatibilities arising from future changes to them. The
information here is subject to change without notice. Do not finalize a design with this information.
The products described in this document may contain design defects or errors known as errata which may cause the product to
deviate from published specifications. Current characterized errata are available on request.
Contact your local Intel sales office or your distributor to obtain the latest specifications and before placing your product order.
Copies of documents which have an order number and are referenced in this document, or other Intel literature, may be obtained
by calling 1-800-548-4725, or go to: http://www.intel.com/design/literature.htm%20
All products, platforms, dates, and figures specified are preliminary based on current expectations, and are subject to change
without notice. All dates specified are target dates, are provided for planning purposes only and are subject to change.
This document contains information on products in the design phase of development. Do not finalize a design with this
information. Revised information will be published when the product is available. Verify with your local sales office that you have
the latest datasheet before finalizing a design.
Intel
Active Management Technology requires the computer system to have an Intel(R) AMT-enabled chipset, network hardware
and software, as well as connection with a power source and a corporate network connection. Setup requires configuration by the
purchaser and may require scripting with the management console or further integration into existing security frameworks to
enable certain functionality. It may also require modifications of implementation of new business processes. With regard to
notebooks, Intel AMT may not be available or certain capabilities may be limited over a host OS-based VPN or when connecting
wirelessly, on battery power, sleeping, hibernating or powered off. For more information, see
http://www.intel.com/technology/manage/iamt/
Watcom Library Source URL for DOS Manufacturing tools: http://www.openwatcom.org/index.php/Download
Code names featured are used internally within Intel to identify products that are in development and not yet publicly announced
for release. Customers, licensees and other third parties are not authorized by Intel to use code names in advertising, promotion
or marketing of any product or services and any such use of Intels internal code names is at the sole risk of the user.
Intel, vPro, Core, Pentium, Celeron and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
*Other names and brands may be claimed as the property of others.
Copyright 2012, Intel Corporation. All rights reserved.
Intel Confidential 3
Contents
1 Introduction ...................................................................................................... 6
1.1 Scope of Document ................................................................................. 6
1.2 Intel
ME SW Components......................................................... 10
2.4.2 Image Components ................................................................... 11
2.4.3 System Tools ........................................................................... 12
2.5 Release Version Numbering Information ................................................... 13
2.5.1 Firmware Update Blacklist Information ........................................ 14
3 Important Notes ............................................................................................... 17
3.1 Important Issues/Notes .......................................................................... 18
3.2 KSC Update........................................................................................... 18
3.3 Intel
ME Kernel ....................................................................... 25
6.2 Closed Integrated Clock Control (ICC) ................................................... 36
6.3 Closed Software / Tools ....................................................................... 37
6.4 Closed Intel
ME Kernel ......................................................................... 58
7.2 Open Integrated Clock Control (ICC) ..................................................... 58
7.3 Open Software / Tools ......................................................................... 59
7.4 Open Intel
Core CPUs).
Intel
MEI.
ICC Integrated Clock Control
Intel
AMT Intel
Active Management Technology
Intel
AT Intel
Anti-Theft Technology
Intel
IPT Intel
MEBx Intel
Management Engine BIOS Extension
Introduction
Intel Confidential 7
Term Description
MRC Memory Reference Code
OS Operating System
BLU-RAY PLAYBACK Blu-Ray* Playback
PCH Platform Control Hub
PKI-CH Public Key Infrastructure with Certificate Hashing
RCFG Remote configuration
SOL Serial over LAN
SPI Serial Peripheral Interface
TDT Theft Deterrence Technology. Previous name for AT-p, which is
part of the Intel
Anti-Theft Technology.
UNS User Notification Service
WMI Windows Management Instrumentation
Release Kit Summary
8 Intel Confidential
2 Release Kit Summary
This document covers the following Intel
6 Series
Express Chipset Hot Fix (HF) 7.1.52.1176
* Target Platform : Sandybridge CPU & Cougar Point Chipset Family / PCH
* .zip name : CPT_1.5M_7.1.52.1176.zip
Contents:
Intel
Management Engine Firmware (for Intel
MEI Driver
Version
7.1.21.1134 (WHQLd) No N/A
SOL Driver Version 7.1.21.1154 (WHQLd) No N/A
2.3 Kit Overview
The kit can be downloaded from VIP (https://platformsw.intel.com/)
Note: A username and password are required to access the website and to log in. User must
have an account created for access.
1. After logging in, click on the link View All Kits on the left side of the web page.
2. Click on the corresponding kit number that is to be downloaded.
3. Select and open the appropriate kit component
4. The Supporting Documentation folder under the selected component contains the
following supporting documentation:
a. 1.5MB FW Release Notes This document gives an overview of the contents of
the entire downloaded component. Also provides the details on closed and
open Sightings and bugs with this kit release.
b. BIOS Release Notes This document provides details of BIOS issues resolved
with the kit.
5. Click on the Installation Files folder under the selected component and extract the
.zip kit into a folder (Example: C:\)
Release Kit Summary
10 Intel Confidential
2.4 Contents of Downloaded Kit
Download the kit, as previously specified, into the directory (C:\). The details of the
contents and directory structure are listed below:
Drivers are included in:
CPT_1.5M_7.1.52.1176
2.4.1 Intel
ME SW Components
Installers Description
ME_SW
Intel
MEI is the interface between the host and the Intel
Management Engine firmware.
Drivers and applications on the host that wish to interact
with Intel
Management Engine through the host interface
use the Intel
MEI host Windows* driver.
Intel
MEI driver is installed by running:
C:\[skuName_x.x.xxxx]\Installers\ME_SW\Setup.exe
The Intel
MEI driver can also be installed using the Have
Disk method in Device Manager, as follows:
o Right click My Computer and select Properties.
o Select the Hardware tab and click Device
Manager.
o Scan for hardware changes.
o Update the particular device driver by pointing to the
INF file:
C:\[skuName_x.x.xxxx]\ME_SW\Installers\Drivers\
\MEI\HECI.inf.
NOTE:
ME_SW installer also installs a Microsoft* Windows* application
(Intel
AMT, Intel
Dynamic Application Loader (Intel
DAL) will
not become permanently disabled and can be
set to either enabled or disabled as required by
the OEM (same as Intel
AT and PAVP).
Background:
Currently the Intel
Dynamic
Application Loader (Intel
DAL)
Background:
This RCR is to change from the internal working
name for the technology (MEDAL) to the official
external name.
7.1.0.1028
Issue Status Definitions
24 Intel Confidential
5 Issue Status Definitions
This document provides sightings and bugs report for Intel
Management Engine
Firmware 7.0 SKU, Software and Tools for Intel
ME Kernel
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3707913 Failure using Media Check Tool due to
FW issue with EPID Group ID multiple
of 256. This HF release supports a fix
for Media Check Tool issue Media
Check Fail: Please check Intel MEI
driver installation and ME firmware
version; System configuration incorrect
for Media Playback.
Affected Component FW.Kernel
Impact: Refer to the Customer
Communication provided separately
with this release.
7.1.52.1176
3792109 Intel
ME until system
is rebooted.
Workaround: N/A
Notes: Typically seen after several
thousand cycles. Issue does not occur
when booting from DOS.
Reproduction Steps:
1. Install Windows* 7 64-bit.
2. Perform continuous warm reboot
cycling until Intel
ME is not
accessible (may exceed 3000
cycles).
7.1.50.1172
3791949 Firmware could go into recovery when
repeatedly running MEMANUF.
Frequency: Infrequent
Affected Component FW.Kernel
Impact: Firmware goes in to recovery
at random junctures when using
MEMANUF
Workaround: N/A
Notes: N/A
Reproduction Steps:
Not consistently reproduced
7.1.20.1119
3791554 HCI does not unregister its dynamic
HECI connection during certain power
management transitions
Affected Component FW.Kernel
Impact: System hang
Workaround: N/A
Notes: N/A
Reproduction Steps:
Not consistently reproduced
7.1.20.1119
Closed Issues
26 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3791580 HCI does not wait for worker thread
completion before deleting thread
during certain warm resets.
Affected Component FW.Kernel
Impact: Global reset
Workaround: N/A
Notes: N/A
Reproduction Steps:
Not consistently reproduced
7.1.20.1119
3790836 PM driver causes exception if it receives
too many illegal BIOS write interrupts
in a short time
Affected Component FW.Kernel
Impact: System hang
Workaround: N/A
Notes: N/A
Reproduction Steps:
N/A
7.1.20.1119
3791909 The system causes GRST during S3
stress testing with specific 3G module
Affected Component FW.MCTP
Impact: System goes to S3
Workaround: N/A
Notes:
Reproduction Steps:
When running suspend/resume stress
tests with specific 3G straps set and 3G
cards populated, platform goes in to
perennial S3.
7.1.14.1107
3791713
System Hangs during transition to S3
when ME is enabled
Affected Component
FW.Kernel.Drivers
Impact: During the system transition
to S3/Moff, ME cannot unload the LME
component due to unexpected
connection sharing with the FWUpdate
component. The resulting hang
prevents the ME from entering Moff;
which prevents the system from
entering S3.
Workaround: Power button override
Notes:
Reproduction Steps:
1. Power on System, and boot to
Windows OS.
2. Run S3 cycling test.
7.1.13.1088
3791710 /
3791711 /
3791712
ME FW corruption could occur if power
loss occurs during ForceFullReclaim
Affected Component
FW.Kernel.StorageMgr
Impact: ME FW corruption could occur
when a ME Full Reclaim is performed
and then there is a power loss during
the reclaim of a data block (Sporadic:
1/500 1/3000).
Workaround: N/A
Notes:
N/A
7.1.13.1088
Closed Issues
Intel Confidential 27
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3791709
ME FW may fail to initialize on boot and
FW version fails to be displayed
Affected Component FW.Kernel
Impact: Timing between ME and HW
init sequence may cause ME to fail on
initialization and FW version fails to
display. Occurrence of this issue is
very low and is dependent on the
combination of chipset and platform
design implementations. Issue is
observed at initial boot.
Workaround: N/A
Notes:
N/A
7.1.13.1088
3791614
PM driver causes exception if it receives
too many illegal BIOS write interrupts
in a short time.
Affected Component
FW.Kernel.PowerManagement
Impact: High number of writes to
BIOSWE register will cause ME to
become unresponsive.
Workaround: N/A
Notes:
N/A
7.1.13.1088
3791316
System hang and unexpected shutdown
seen on S0 -> S3 and S3 -> S0
transition during stress testing.
Affected Component
FW.Kernel.Drivers
Impact: While going into S3/Moff, ME
gets stuck going into Moff preventing
Kernel Loader to turn off LME
component.
Workaround: N/A
Notes:
Reproduction Steps:
1. Power on system
2. Run S3 cycling tool e.g.
Sleeper
3. Wait for system hang
transitioning from S0->S3-
>S0. Windows will display
Unexpected shutdown
occurred error message on
next Windows bootup.
7.1.10.1065
3791282
Global reset (GReset) does not occur
after CPU replacement after Closemnf.
Affected Component FW.Kernel
Impact: Global reset initiated by MEBx
occurs on second boot if CPU is
replaced with different CPUID and CPU
Brand
Workaround: none
Notes:
7.1.10.1065
Closed Issues
28 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3791166
PCH temperature is 0 degree Affected Component
FW.Kernel.SMBusDriver
Impact: Fixes an issue where PCH
thermal data is reported as 0
incorrectly
Workaround: none
Notes:
Reproduction Steps:
Monitor SMBus traffic over a long
period of time. Eventually 0 PCH
temperature readings will be seen from
the PCH.
7.1.10.1065
3791145
Heuristics disabled after Level 3
upgrade from STD on B65 SKU
systems.
Affected Component FW.Kernel
Impact: System defense heuristics will
not be functional after upgrade.
Workaround: none
Notes:
7.1.10.1065
3791143
ME FW shows Error code is disabled
after FWUpdlcl failure.
Affected Component FW.Kernel
Impact: ME FW writes error status to
the wrong FWSTS1 field.
Workaround: none
Notes:
7.1.10.1065
3791141
FWUpdate shows an error message
after FWUpdate fails to a blacklisted FW
and a reboot does not occur
Affected Component
FW.Kernel.FWUpdate
Impact: The FW Update tool shows
expected error while downgrade (errors
8741 and 8758) to a blacklisted FW. If
an upgrade to a good FW update image
is attempted without performing a
reboot, FW gives unexpected error
8741("FW Update failed"), followed
with "Trying to receive update status.
System may hang on this status. When
tried to reboot at this time, FW enters
recovery mode.
Workaround: none
Notes:
7.1.10.1065
Closed Issues
Intel Confidential 29
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3790985
Buffer overflow vulnerability in the
implementation of the
System.arraycopy method may be
exploited by an untrusted applet to
escalate privileges (issue #6009).
This is caused by an incorrect check on
the parameters src_offset, dst_offset,
and length. The implementation fails to
detect when the sum src_offset+length
or dst_offset+length overflow. In this
case, instead of throwing an instance of
ArrayIndexOutOfBoundsException, the
implementation proceeds to copy the
data, thus allowing the applet to access
to memory outside the arrays passed in
parameters.
Affected Component FW.Kernel
Impact: CVSS score is 6.8
(AV:L/AC:L/Au:S/C:C/I:C/A:C).
Increased Privileges for Untrusted
Applets
Category: Severe
All Gen1 releases are affected. The
BETA-1 Gen2 release is also affected.
Gen1 is used in Intel
Firmware
enabled features has been observed in
some customer manufacturing lines as
they began ramping their consumer
system manufacturing to high volume.
While the systems should remain
functional, under certain circumstances,
one or more Intel Firmware enabled
features may not work when
provisioned.
Affected Component FW.Kernel
Impact: The worst case Intel Firmware
enabled feature DPM is 3900. Due to
the number of variables required to see
this issue, including the number of Intel
firmware enabled features present on
the platform, customers should expect
to see significantly less than worst
case, possibly none.
Workaround: none
Notes: None
7.1.3.1053
3790829
Firmware does not properly update SPI
information when changing from one
processor type to another processor
type.
Affected Component FW.Kernel
Impact: Medium
Workaround: none
Notes:
7.1.2.1041
Closed Issues
Intel Confidential 31
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3790760
AT-P enabled system cannot shutdown
after receiving "Poison Pill" over 3G
network.
Affected Component
FW.Kernel.SMBusDriver
Impact: Medium
Workaround: none
Notes:
Reproduction Steps:
1. Boot to OS with WWAN 5550.
2. On the server, using a CMD prompt
run 'isv_server ?i server_ip.
3. On the Client, using a CMD prompt
run 'isv_client ?i server_ip -e, allow the
SUT to enroll.
4. On the server, using a CMD prompt
run 'sqlite3 tdt.db < test2.txt' and run
'sqlite3 tdt.db < timers.txt. Observe
several rendezvous's.
5. Stop the isv_client (CTRL-C). Launch
the isv_client using the following
format: "isv_client ?i server_ip ?g and
?t isv_server SMS phone -r 10000 -q
\.\\com port"
6. Stop the isv_server. On the server,
run the following commands:
- "sqlite3 tdt.db"
- "Update slog set state=2;"
- "Select Client_id from pinfo;" ->
record the client ID
- ".quit"
7.On the server, run: "genoob.exe -kill
-t 000-000-0000 -c client_id -a 1 -q
\.\\com12" where 000-000-0000 is the
ISV Client SMS Phone# and client_id is
from the previous step ->(When run
this command on server, the client will
receive SMS message[step 8] and after
few minutes the system should be
shutdown).
8. Ensure server received SMS
message.
9. Verify the system cannot shut down
within a few minutes.(The client system
should be shut down).
7.1.2.1041
Closed Issues
32 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3790809
Intel
Management Engine
Firmware 7.0 SKU 5.0MB Production
Candidate or later FW to a Pre-
Production 7.1 Firmware.
Affected Component FW.Kernel
Impact: For quality and security
reasons, all Pre-Production FW will not
work on PRQ parts.
Workaround: none
Notes:
This change is being made to prevent
an end user from using FW Update to
load 7.1 pre-production FW onto a
system in the field. There is no change
to the FW Update code, only the data
with the upgrade/downgrade
restrictions.
7.1.0.1023
3553317
Firmware Watchdog Global reset
occurring during power management S0
<--> S3Mon stress testing after
approximately 1100 iterations.
Affected Component
FW.Kernel.PowerManagement
Impact: Firmware unexpectedly issues
a global reset
Workaround: restart
Notes:
This is Mobile specific
Reproduction Steps:
1. Burn the image disable reboot
standby
2. On OS run a stress S0Mon-S3Mon
wake by Pwr button
7.1.0.1023
Closed Issues
34 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3553117
The system shutdowns during POST
when AC power is plugged in after
CMOS clear
Affected Component
FW.Kernel.PowerManagement
Impact: Platform will not come out of
S5 state.
Workaround: none
Notes:
Reproduction steps:
1. Set to DC power source only
2. Use a non DeepSx image and disable
DeepSx in BIOS
3. Type wrong password three times to
generate a Global reset. The platform
does not recover.
7.1.0.1023
3551710
HM65 SKU Mgr Test fails on Pentium
and Celeron CPU emulations; Wireless
display is shown as enabled when it
should be disabled.
Affected Component FW.Kernel
Impact: Unexpected behavior.
Wireless display should not be enabled
for these configurations.
Workaround: none
Notes:
Reproduction steps:
1. Use FITc to build 4 FW images using
FW kit, one each of CPU emulations
vPro, Core, Pentium and Celeron
2. Flash SUT with each image, and then
check the features.
7.1.0.1005
3551117
Ant MEBx error occurs when trying to
enable AMT (Intel manageability) after
it has been disabled via FOV.
Affected Component FW.Kernel
Impact: Unexpected behavior. Re-
enabling AMT through the MEBx should
not result in an error.
Workaround: re-flash image
Notes:
Reproduction steps:
1. Burn native image. (when Global
lock bit is disabled)
2. Perform CMOS clear.
3. Edit bios setting according to the
latest BKM.
4. Boot to OS.
5. Set FeatureShipmentTimeState (AMT
disable/enable) to disable through FOV
(id: 000B value: 00000002 (must G3
after)).
5. G3 the platform.
6. Enter MEBx and try to enable AMT
back.
7.1.0.1005
Closed Issues
Intel Confidential 35
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3550817
Setting any FOV value immediately a
platform soft reset (ctrl-alt-del) will
cause a global reset and firmware hang
on reboot.
Affected Component FW.Kernel
Impact: Unexpected behavior.
Workaround: Recovery G3.
Notes:
Reproduction steps:
1. Burn native image.
2. Perform CMOS clear.
3. Edit bios setting according to the
latest BKM.
4. Wait for os load and make restart, (if
you are on OS selection menu you can
press Alt+Ctrl+delete instead).
5. Try to set any FOV value using FPT
tool.
7.1.0.1005
Closed Issues
36 Intel Confidential
6.2 Closed Integrated Clock Control (ICC)
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3790913 23Hz refresh rate improved solution for
higher security and fewer numbers of
pop-ups.
To reduce frame judder while playing
back 23Hz content, currently display
driver programs clock bending through
CUI, ICC.dll to ICC HW.
For this feature to work without being a
nuisance to the end-user, UAC must be
set to "never notify". As board designers
would be motivated to leave UAC on due
to legitimate security concerns, the 23
Hz frame judder will be high as a result.
Affected Component: FW.ICC, PCH
HW, Graphic driver Display clock
Bending
Impact:
Workaround:
Resolution:
The solution is for ME FW to program
SSC4 module with default settings that
work for all CE modes for 23/29 and
59Hz for 24b color. When user selects
any of the CE modes and 23Hz, display
driver will simply program display PLL
to use SSC4 output. This avoids CUI
and ICC.DLL interaction. UAC settings
can remain anything above "never
notify" in this case. There is no
dependency on it. There are no pop-up
messages with this solution either.
7.1.2.1041
3552011
Boot timeout ICC recovery from extreme
overclocking does not work.
Affected Component FW.ICC
Impact: Overclocking does not work
properly when HT / Core disable
capabilities are configured.
Workaround: Configure image with
HT / Core control disabled
Notes:
Reproduction Steps:
1. Build Overclocking config
2. Use CCDC tool to change BCLK to
120MHz for next boot
3. Reboot system
7.1.0.1005
Closed Issues
Intel Confidential 37
6.3 Closed Software / Tools
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
370913
MEManuf tool has been updated to
provide a check for firmware incorrectly
reporting EPID Group IDs
Affected Component
SW.Tools.MEManuf
Workaround: None.
Impact: Refer to the Customer
Communication provided separately
with this release.
7.1.52.1176
3792110
Memory leak in LMS after installing
Microsoft* Installer 4.5 on Microsoft*
Windows XP system.
Affected Component
SW.AMT.Services
Impact: Degradation of memory
resources.
Workaround: N/A
Notes:
Reproduction Steps:
1. Boot to Microsoft* Windows and
install Microsoft* Installer 4.5.
2. Install system drivers (Chipset, LAN
and graphics).
3. Install ME
4. Disable screen saver.
5. Disable Sleep states in power
management.
6. Display a non-pool page in Device
Manager.
Allow system to run and monitor non-
pool page for LMS.exe.
7.1.50.1172
Closed Issues
38 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3792078 False empty registry folders created in
certain flavors of Windows XP by User
Notification Service.
Affected Component
SW.TOOLS
Impact: False and empty folders
in XP registry.
Workaround: N/A
Notes:
On XP, UNS creates a lot of empty
folders in registry
HKU\.DEFAULT\Software\Microsoft
\Windows\CurrentVersion\Internet
Settings\Digest\Hosts\..
Reproduction Steps:
1. Open process monitor
2. Set filter:
a. Process Name = UNS.exe
b. Path contains HKU
3. Insert Disk on Key
4. Perform any Ws-man related
operation
Expected Results:
==================
UNS doesn't create empty registry
keys
Actual Results:
===================
UNS creates about 15 empty
registry keys
HKU\.DEFAULT\Software\Microsoft
\Windows\CurrentVersion\Internet
Settings\Digest\Hosts\ and looks
for reg key with computer name
7.1.40.1161
3791733 FPT unable to read values of certain
NVARs using their FOV name.
Affected Component
SW.Tools.FlashProgrammingTool
Impact: Unable to extract value by
name
Workaround: none
Notes:
Reproduction Steps:
N/A
7.1.30.1142
Closed Issues
Intel Confidential 39
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3791679 FPT read output file command does not
create output file but displays
successful
Affected Component
SW.Tools.FlashProgrammingTool
Impact: False positives on FPT
outputs.
Workaround: none
Notes:
Reproduction Steps:
1. fpt -r <name>
2. fpt -r <name> -o out.txt
3. Variable read info is displayed to
user, yet no file has been generated
with output
7.1.30.1142
Closed Issues
40 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3791890 MEINFO feature retrieve for OEM Tag
with value of zero accepts invalid values
Affected Component
SW.Tools.MEINFO
Impact: Using retrieve feature option
along with value verify against OEM
Tag allows invalid values to pass as a
value match
Workaround: none
Notes:
Reproduction Steps:
1. do not set OEM_Tag variable. If set
to non-zero value, use FPT to update
OEM_Tag FOV to 0x00000000
2. Use MEINFO feature retrieve and
value options against "OEM Tag"
feature using expected value
"meinfo.exe -feat "OEM Tag" -
value 0x00000000"
3. Use MEINFO feature retrieve and
value options against "OEM Tag"
feature using invalid values:
0xx123
x123
youfail
!no1
"you>fail
See OEMTagbug.txt and
oembug7120.png for information
regarding the possible commands that
are accepted as pass.
Expected Results:
==================
in RED characters "Error 9473: OEM
Tag actual value is- 0x00000000"
Actual Results:
===================
Result printed on screen in GREEN:
OEM Tag: Success Values matches
FW value.
7.1.30.1142
Closed Issues
Intel Confidential 41
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3792001 Fwupdlcl tool returns a value of zero
for the ERRORLEVEL variable when the
tool is used to update from a 1.5 MB
image to a 5MB image even though an
error message is generated.
Affected Component
SW.Tools.FWUpdLCL
Impact. May impact manufacturing
line if theERRORLEVEL variable is used
to determine whether the FWupdlcl tool
passed or failed
Workaround: none
Notes:
Reproduction Steps:
1) Flash 1.5 MB FW image.
2) Use Fwupdlcl tool to update with a
5 MB FW image
3) Tool exits with Error message but
leaves ERRORLEVEL variable at 0
7.1.30.1142
3791881
In IUSMANUF tool, the System
Integrator Index displays the
following:(0: for first empty slot: >0 for
specific slot):
Affected Component
SW.Tools.IUSManuf
Impact: User is supposed to use one
of three specific slots for the integrator
index but tool is only displaying zero as
the specific slot and for the first empty
slot.
Workaround: none
Notes:
Reproduction Steps:
1. Flash SUT with latest 7.1 FW
2. Set default BIOS settings.
3. Using IUSMANUF tool from
the latest kit, use the
following command:
ISUmfWin.exe -setid
Result:
System integrator ID: 909090
System Integrator Index (0: for first
empty slot: >0 for specific slot):
7.1.30.1139
Closed Issues
42 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3791846 MEMANUF -EOL -VERBOSE -PAGE fails
to pause, only occurs in DOS
Affected Component
SW.Tools.MEMANUF
Impact: MEMANUF information is
garbled with certain handles.
Workaround: none
Steps to Reproduce:
1. Flash image.
2. Boot to DOS.
3. Execute MEMANUF -EOL -VERBOSE
PAGE
Expected Results:
==================
EOL test executes, and debug
information is displayed on STOUT with
pauses after each page of data.
Actual Results:
===================
No pause occurs. EOL test executes
and all information scrolls out on
STOUT without interruption.
7.1.30.1142
3791964 MEInfo using invalid trademark name
for DAL (Dynamic Application Loader)
Affected Component
SW.Tools.MeInfo
Impact:
Workaround:
Notes: Trademark name for Dynamic
Application Loader DAL is now
displayed when using MEInfo
7.1.20.1119
3791370 updparam tool fails when trying to
change passwd and network access
Affected Component
SW.Tools.UpdParam
Impact: Updparam changed
password after sending Complete
configuration. However, when FW sees
complete configuration request and the
password is the default MEBx
password, it returns an error.
Workaround: The fix is to change the
password first before sending complete
configuration.
Notes: N/A
7.1.20.1119
Closed Issues
Intel Confidential 43
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3791484 MEFW update failure/Unable to access
MEBx on BIOS update
Affected Component
SW.Tools.FWUpdLcl
Impact: On some systems after
applying a BIOS update which contains
an MEFW update systems the following
error message is seen during the
update:
"ME Firmware Update Failed!"
"Could not access the firmware storage
device"
On reboot MEBx is no longer accessible
and system is not AMT manageable.
Workaround: N/A
Notes: N/A
7.1.20.1119
3791553 The option to name an optput file when
using the NVAR Retrieve function uses
'-f <>' instead of '-o <>'
Affected Component
SW.Tools.FlashProgrammingTool
Impact:
By convention, the Flash Programming
Tool, FPT, uses the '-o <fileName>'
command line option to specifiy an
output file is desired. For the NVAR
Retrieve function it is specified using '-f
<>'.
Workaround: N/A
Notes: N/A
7.1.20.1119
3791497 Due to a tool implementation issue,
MEInfo tool may incorrectly report PCH
Revision ID.
Affected Component
SW.Tools.MeManuf
Impact: Previous MEInfo versions
may display incorrect chipset
information.
Workaround:
Notes: Optional MEInfo fix.
N/A
7.1.13.1088
3791285 Immediately after reboot, FPT Display
option "-i" (FPT i) returns error with
EFI and 64-bit versions of FPT.
Affected Component
SW.Tools.FlashProgrammingTool
Impact: Fixes two errors when
running FPT i prior to other ME tools
(e.g. MEinfo or MEManuf). Operator
will see Signature: INVALID! and
Error 400: Flash descriptor does not
have correct signature.
Workaround: Run MEinfo prior to
running FPT Display option in EFI or
64-bit versions.
Notes:
Reproduction Steps:
1. Run ftp i after bootup and prior to
running MEInfo or MEManuf
7.1.10.1065
Closed Issues
44 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3791081 When selecting an image greater than
16MB in FITC, (for example 2 SPI
devices with total density > 16MB,
produced image does not have correct
Flash Region Register Base and Limits
for any region above 16MB. The base
and limit that is in the descriptor does
not correspond to what's in the .map
file.
Affected Component
SW.Tools.FlashProgrammingTool
Impact: Regions overlap, which
results in platform not able to boot or
ME errors.
Workaround: none
Notes:
Reproduction Steps:
1. Open FITC
2. Select Number of Flash
Components = 2
3. Under Component Section, select
each flash density 16MB (can also be
1=16MB. Total image size has to be
greater than 16MB
4. Include ME, BIOS, and PRD region
5. Open the output.map file
6. Open output.bin (32MB) with hex
editor
7. Compare base and length defined
in the .bin file starting at offset 0x40
with the addresses in the .map file.
8. Notice that any region that resides
at offset greater than 16MB will have
incorrect limit or base or both because
FITC doesn't set bits 12 or 28 which
map out to be bit 24 of the base
address or base ending address
7.1.10.1065
3791018 MEManuf -S5 will not work with non-
vPro CPU; displays message Error
9296: MEManuf Operation Failed
(1000)
Affected Component
SW.Tools.MeManuf
Impact: Low.
Workaround: Executing MEMANUF
S0 no3g skips this test.
Notes:
Reproduction Steps:
1. Run command MEManuf S5
MEManuf tool will display Error 9296:
MEManuf Operation Failed (1000)
7.1.10.1065
Closed Issues
Intel Confidential 45
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3553415 Flash Programming Tool (FPTW.exe)
fails to disable ME causing system to
hang intermittently.
Affected Component
SW.Tools.FlashProgrammingTool
Impact: When erasing the ME region
in flash the ME must be disabled. This
was being done for most accesses
except when doing a Chip Erase (
FPTW.exe -c ).
Workaround: none
Notes:
Reproduction Steps:
1. Flash FW with current SPI image
2. Reset system (G3)
3. Boot OS as normal
4. At command prompt
a. Run fpt.exe c
b. Run fpt.exe b
c. Run fpt.exe -f
full_image.bin -desc
d. Run fpt.exe -f
full_image.bin -bios
e. Run fpt.exe -f
full_image.bin -me
f. Run fpt.exe -f
full_image.bin -gbe
g. Run fpt.exe -f
full_image.bin -pdr
h. Run fpt.exe -verify
full_image.bin
5. Reboot System/G3 power cycle
6. At command prompt run meinfo.exe
to verify FW version
Expected Results:
1. After each command there should
be a message indicating the operation
was successful.
2. At step 5. The system should restart
and load OS normally.
3. The FW version number in step 6.
Should be the same as what is in the
binary_image.bin.
Actual Results:
1. From step 4.A. through 4.E. the
system will intermittently lock or hang.
2. The execution of 4.A. initiates
system instability.
7.1.10.1065
Closed Issues
46 Intel Confidential
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3790870 MEManuf reports failure of WLAN BIST
when using Condor Peak WLAN
Affected Component
SW.Tools.MeManuf
Impact: MEManuf performs WLAN
BIST with non-vPro systems when
Condor Peak WLAN card is detected.
Workaround: none
Notes:
Reproduction Steps:
5. Configure 5 MB QM67 image with
WLAN Power Well Config set to
0x80 (disabled) in ME Region-
>Configuration->ME.
6. Flash on mobile system
7. Run MEManuf
8. MEManuf will fail on WLAN BIST
7.1.10.1065
3790750
The Intel
DAL permanent
disable unexpectedly set to No after
decomposing 7.1 images despite value
set to Yes.
Workaround: none
Notes:
Reproduction Steps:
1. Create a flash image in FITC with
Intel
Anti-Theft Technology
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3551888
GpsLocationBeaconNotification messages
received after
ConfigureGpsLocationBeaconing(enable=
false)
Affected Component FW.TDT
Impact:
GPSLocationBeaconNotification
messages being received.
Workaround: none
Notes:
Steps to Reproduce:
1. Flash image on platform with Fitc to
set MCTP enable=true, address=0x30.
2. Flash platform, Set BIOS default (AT
enabled), boot to OS
3. Provision AT, run Basic-Setup.bat,
ConfigureSMS, GetMEIK, SetClientId
4.
ConfigureLocationBeaconing(Enable=tr
ue, TimeInterval=60, TxCount=6,
TriggerMask=0x2), AssertStolen, call
GpsLocationBeaconNotification 6 times,
DeAssertStolen.
5.
ConfigureLocationBeaconing(Enable=fa
lse, TimeInterval=60, TxCount=6,
TriggerMask=0x2), AssertStolen
6. Call GpsLocationBeaconNotification 6
times.
7.1.0.1005
3550901
HECI failure observed after clearing
CMOS while in Suspend state.
Affected Component FW.TDT
Impact: Getstate will fail to open the
HECI client.
Workaround: none
Notes:
Steps to Reproduce:
1. Flash FW, Set Default BIOS settings
2. Provision AT-p, GetPublicKey,
SetPublicKey, SetCredential
3. GetState, SetSuspendModeRemote,
GetState
4. Clear CMOS. Set BIOS default
settings. Boot to OS
5. Query Getstate
7.1.0.1005
Closed Issues
Intel Confidential 53
6.5 Closed Intel
Upgrade Service
Issue # Description Affected Component/Impact /
Workaround/Notes
Fixed in Kit#
3534838
ME RESET is being counted toward PCH
MTP Period Boot Count.
Affected Component FW.CLS
Impact: MTP period boot count would
expire earlier than expected.
Workaround:
Notes:
Steps to Reproduce:
Flow-A
===========
1. Flash PCH MTP (ExpTime=90mins,
ExecTime=30mins, PeriodType=1,
Period=3)
2. Boot to OS Verify MTP is in Applied
state
3. Wait for the Default "7days/mins" to
expire. Once expired, Period
Boot Count should being counting.
4. Warm Reset (BootCount=1)
5. Verify MTP still in Applied state
6. S3 (BootCount=2)
7. S4 (BootCount=3)
8. ME Reset(Should not be counted
toward Boot Count). However, this ME
Reset results in GRESET and
GetPermitInfo returns MTP NO LONGER
in APPLIED state.
Flow-B
============
1. Issue ActivateMTP(Period=3 Boots)
2. WarmReset (BootCount=1)
3. Verify MTP is in APPLIED state
4. WarmReset (BootCount=2)
5. ME Reset (Does not result in
GRESET)
6. ME Reset (Results in GRESET)
MTP Permit is De-Activated after 2nd
ME Reset, although ME Reset should
not have been counted.
7.1.0.1005
Closed Issues
54 Intel Confidential
6.6 Closed Not Firmware Issue
Issue # Description Affected Component/Impact / Workaround/Notes
3584530 MEBx will present incorrectly extended
ASCII text ,when vBios code page is not
standard English (437)
Affected Component ExternalDependency
Impact: MEBx AMT User consent text containing letters in the
range ASCII 128-255 might be displayed incorrectly.
Workaround: Set the user consent language from localized
back to English (can be done programmatically or through
IMSS).
Note: This could also affect the setting of sprite language in the
case of switchable GFX.
Notes:
Reproduction Steps:
1. Install SUT with graphic card containing vbios without
standard code page.
2. Test user consent in mebx showing message with
extended ASCII incorrectly.
3551877
SMS GpsLocationBeaconingNotification
fails to detect beacon messages from
FW with trigger mask 0x8 (Attack
Detected)
Affected Component FW.TDT
Impact: There are no Beacon messages being seen.
Workaround: none
Notes:
Steps to Reproduce:
1. Using Fitc, modify FW to enable MTCP and set MTCP address
0x30
2. Flash platform, enter BIOS enable AT. Boot to OS, Provision
AT, run Basic-Setup.bat
3. ConfigureSMS, GetMEIK, SetClientId,
ConfigureGpsLocationBeaconing(BeaconEnable=Enabled,
TimeInterval=60, TxCount=4, TriggerMask=0x8) enable PBAM
after EOP.
4. Clear CMOS, boot to OS, GetState(State=Stolen, Theft
Trigger=Attack Detected)
5. call SmsGpsLocationBeaconingNotification
3550806 Host wake on Magic Packet not waking
platform after a G3 exit to S5. It does
work with S0 -> S5 power flow.
Affected Component ExternalDependency
Impact: Platform will not respond to Magic Packet.
Workaround: none
Notes:
Reproduction Steps:
1. Setup BIOS, set it to S5 after g3 save and exit
2. Boot up to windows S0/M0
3. Graceful shutdown
4. G3 Turn power off
5. AC Turn power back on
6. Send a magic packet to bring the SUT back to S0/M0
Closed Issues
Intel Confidential 55
Issue # Description Affected Component/Impact / Workaround/Notes
3535026 A global reset is occurring after 30-165
iteration of S3/M3 (5MB FW) or S3/Moff
(1.5MB FW) with DeepSx disabled.
Affected Component ExternalDependency
Impact: Platform will unexpectedly global reset after multiple
pass S3 cycle testing.
Workaround: none
Notes:
Reproduction Steps:
1. Flash No DeepSx Image (4 or 8M)
2. Setup BIOS, save and exit
3. Enter MEBx and setup as usual (8M only)
4. Boot up to OS
5. Start S3 cycle testing
Closed Issues
56 Intel Confidential
6.7 Closed No Plan to Fix
Issue # Description Affected Component/Impact / Workaround/Notes
3551778
AuditLog does not get updated with new
record when a firmware update failure
occurs.
Affected Component FW.Kernel.FWUpdate
Impact: If firmware update fails there will be no corresponding
event record to indicate this.
Workaround: none
Notes:
Deferred to future project
Reproduction steps:
1. Make provisioning in ACM mode, set the default.config.xml
to enable the audit log.
2. Set Firmware Update failed event to be enabled by the
AMT_AuditPolicyRule.SetAudiyPolicy method.
Enable 1
AuditAppID 19
EventId 1
Flag 0
3. Perform Firmware Update, use an invalid image
Use FW update windows tool from: \Tools\System
Tools\FWUpdate\Local-Win, and run locally:
"fwupdlcl -f [image name] -generic "
Image is located on the kit in: Image Components\ME.
FW update proccess should fail.
4. Read Audit log's records.
3551045
Setting End of Manufacture using FITC
causes more boots on Mobile platform
than it does on Desktop platforms.
Affected Component FW.CLS
Impact: Permit attribute of MTP is not active as expected.
Workaround: none
Notes:
Deferred to future project
Steps to Reproduce:
1. Use FSTApp to generate PCH MTP binaries with
periodtype=1, period=3, Execution time=5 minutes, Expiration
time=30 minutes.
2. Use FITc to build PCH MTP image with resolution set to
Minutes and Globallock set.
3. Flash via Dediprog/FPT > G3(unplug power) > Reapply
Power > Boot to BIOS > Set following Parameters:
3a. Set SATA Mode = IDE [ADV > CONFIG > SATA CONFIG]
3b. F4 to Save and Exit
4. Boot to OS
5. Check the permit attributes of PCH MTP.
Closed Issues
Intel Confidential 57
6.8 Closed Documentation Change
Issue # Description Affected Component/Impact / Workaround/Notes
3792059
Update Patsburg SPI Programming
Guide FITC PCH Strap 16 -> Bit 14 & 18
for Patsburg are Disable & Changeable.
Affected Component
Documentation.SPIFlashProgramming Guide
Impact: SPI Programming Guide does not have guidance for
FITC setting.
Workaround: N/A
Notes: PCH Softstrap 16 bits 14 and 18 have been
documented as Reserved and default setting as "1" in
Patsburg_SPI_Programming_Guide_454672_rev_1.63.pdf.
3534716 /
3534717 /
3535281
Executing FPT with the -c command
line parameter results in error 27 being
returned.
Affected Component
Documentation.SystemToolsUserGuide4MB
Impact: FPT returns an error 27 Host CPU does not have
erase access to target flash area.
Workaround: Either limit the area to the area available
using the -length command *or* create a 2 SPI component
image.
You know it will error out when you receive the message in
FPT:
"Warning: There are some addresses that are not defined in
any regions. Read/Write/Erase operations are not possible
on those addresses"
Notes:
Reproduction Steps:
1. From dos command line in FPT-Win...FPT.exe -c
Known Issues
58 Intel Confidential
7 Known Issues
7.1 Open Intel
ME Kernel
Issue # Description Affected Component/Impact / Workaround/Notes
7.2 Open Integrated Clock Control (ICC)
Issue # Description Affected Component/Impact / Workaround/Notes
BUP000001
27-MHz FLEX Clock (for switchable
graphics) has unexpected output value,
unless Display PLL ownership is
transferred to Intel
ME.
Symptom: Upon boot or SX resume, on-
board graphics down devices will not
function as expected. Note: No official
support for switchable graphics is
currently provided with 27-MHz from
Cougar Point PCH.
Affected Component: FW.ICC
Impact:
Workaround: The following bits need to edited as specified to
utilize on-board graphics down devices that use 27-MHz FLEX
clock from Cougar Point:
PLLEN bit 9 = 1b (Enable ME Ownership)
DPLLBC bit 30 = 1b (Enable DPLLB)
Optional steps 3 and 4 If 27-MHz SSC clock is needed from
CPT:
DPLLAC bit 30 = 1b (Enable DPLLA)
DPLLAC bits 26:24 = 011b (Enable 27M spread on DPLLA)
This editing can be done in one of two ways:
Invoke Flash Image Tool with a commandline option fitc.exe
/iccext, and edit the parameters directly in the FITC GUI. This
option causes all ICC Registers to appear as dword values only, so
raw dword values must be edited - there are no GUI bit-by-bit
enhancements available as is when FITC is invoked without the
/iccext commandline option.
Edit the parameters in the SPI Flash Image binary configuration XML
file used by FITC. Note that this XML file is not the ICC Configuration
XML, which has been deprecated and is no longer used by FITC. You
must edit these parameters in the XML file and save the XML before
starting FITC. The recommended method of doing so is making a
copy of newfiletmpl.xml and editing the copy. Note that IccProfile1
corresponds to Profile 0 in SPI Flash, IccProfile2 to Profile 1, and so
on.
Note that 27-MHz Flex Clocks are available in both versions of
the FITC GUI, with and without /iccext and no workarounds
specified in previous kits are necessary.
Known Issues
Intel Confidential 59
7.3 Open Software / Tools
Issue # Description Affected Component/Workaround/Notes
3551432
When installing the MEI-Only Installer
the Readme File Information windows
shown to the user is empty.
Affected Component Build
Impact: Readme information section blank in installer.
Workaround: none
Notes:
Reproduction Steps:
1. Open the Installers folder start MEI-Only installation
7.4 Open Intel
Anti-Theft Technology
Issue # Description Affected Component/Impact / Workaround/Notes
7.5 Open Intel
Upgrade Service
Issue # Description Affected Component/Impact / Workaround/Notes
7.7 Open Not Firmware Issue
Issue # Description Affected Component/Impact / Workaround/Notes
4027368 AT7.1.20 Power: When using SATA port
4 Platform fails to load SuSE Linux OS
(~10% of time for DT and ~5% for
MBL)
Affected Component: BIOS
Impact: Some failures with SATA ports loading Linux
Workaround: none
Notes:
Reproduction Steps:
1. Burn Image
2. Load SuSE Linux OS.
3. Move to S5.
4. Repeat steps 2-3 until reproduced (should happens
within a few flows).
Known Issues
60 Intel Confidential
7.8 Open - Documentation Change
Issue # Description Affected Component/Impact / Workaround/Notes
3792037
Patsburg SPI Programming Guide
doesn't explain bits PCH Strap 16 Bits
27:24
Affected Component SW.AMT.Docs
Impact: Document lacks details for configuration.
Workaround: N/A
Notes: